RGB Intensity Based Variable- Bits Image Steganography
|
|
- Juliet Poole
- 5 years ago
- Views:
Transcription
1 RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on Multimedia, Information Privacy & Intelligent Computing Systems December 9-12, 2008, Yilan, Taiwan Mohammad Tanvir Parvez & Adnan Abdul-Aziz Gutub College of Computer Sciences & Engineering King Fahd University of Petroleum & Minerals (KFUPM) Dhahran, Saudi Arabia
2 Outline The problem Instance Goals Algorithm Idea Step Examples Experimentations Visual and statistical analysis Comparisons Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 2/21
3 The Problem Hide (embed) a file within another file Data File Cover File Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 3/21
4 Applications Hiding copyright info Avoid snooping Data encapsulation E.g. explanatory information within X-ray images Copyright protections Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 4/21
5 Algorithmic Goals Secure Less Distortion Visual Statistical (like Histogram) Not guessable Data location High capacity Not dependent on cover image Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 5/21
6 The Idea Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 6/21
7 Algorithm: Features One channel as indicator Data in one of the other channels Variable-bits per channel Lower color value Higher no of bits Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 7/21
8 Algorithm Outline R G B The Algorithm 1. Chose an indicator 2. Chose the channel 3. Decide no of data bits - Partition scheme 4. Get & store the data [say 1101] 5. Modify the other channel (if needed) Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 8/21
9 Example 50 X: 1 Y: 1 RGB: 255, 255, 255 X: 215 Y: 63 RGB: 33, 8, X: 1 Y: 1 RGB: 254, 255, 255 X: 215 Y: 63 RGB: 33, 8, Up to 7 bits have been modified Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 9/21
10 Expectations Secure Random indicator sequence Statistically undetectable Only lower bits are changed High capacity How much of these can be achieved? Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 10/21
11 Experimentations Cover Image Data File Image size: 640 X 480, Bit depth: 24 No of pixels = Image size: 150 X 117, Bit depth: 24 Data length = bits Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 11/21
12 Experimentations Pixels utilized: Constant 3 bits per channel Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 12/21
13 Experimentations Pixels utilized: /4 bits per channel Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 13/21
14 Experimentations Pixels utilized: Constant 4 bits per channel Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 14/21
15 Experimentations Pixels utilized: /5 bits per channel Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 15/21
16 Histograms Histogram of Red channel: cover image Histogram of Red channel: stego file Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 16/21
17 Histograms Histogram of Green channel: cover image Histogram of Green channel: stego file Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 17/21
18 Histograms Histogram of Blue channel: cover image Histogram of Blue channel: stego file Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 18/21
19 Comparison Technique No of data bits per channel (bits) No of pixels of cover media utilized (pixels) No of pixels of cover media utilized (percentage) Intensity Based Variable-Bits 3 3 or or % 13.37% 12.49% 11.65% Pixel Indicator % 19.22% 14.55% Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 19/21
20 Comparison: High Capacity 50 Our Algorithm Cover Image Pixels utilized: 16.5% Constant 3 bits per channel Pixel Indicator Algorithm Data File Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 20/21
21 Summary New idea in image based steganography Variable-bits per channel High capacity algorithm Secure Random indicator sequence Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 21/21
EE663 Image Processing Histogram Equalization I
EE663 Image Processing Histogram Equalization I Dr. Samir H. Abdul-Jauwad Electrical Engineering Department College of Engineering Sciences King Fahd University of Petroleum & Minerals Dhahran Saudi Arabia
More informationWeb Database Connectivity
Web Database Connectivity MUHAMMAD ATIF TAHIR atif@ccse.kfupm.edu.sa Computer Engineering Department King Fahd University of Petroleum and Minerals Dhahran-31261, SAUDI ARABIA Lets get started... The purpose
More informationHigh Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator Technique
igh Capacity mage Steganography Method Using LZW, WT and Modified Pixel ndicator Technique Swati Goel Pramod Kumar Rekha Saraswat M.Tech(CSE),CDAC Noida M.Tech(T),CDAC Noida Sr. Lecturer (SOT),CDAC Noida
More informationMessage Concealment Techniques using Image based Steganography
Message Concealment Techniques using Image based Steganography Farhan Khan and Adnan Abdul-Aziz Gutub Department of Computer Engineering King Fahd University of Petroleum & Minerals, Dhahran, 31261, Saudi
More informationMessage Concealment Techniques using Image based Steganography
Message Concealment Techniques using Image based Steganography Farhan Khan and Adnan Abdul-Aziz Gutub Department of Computer Engineering, King Fahd University of Petroleum & Minerals, Dhahran, 31261, Kingdom
More informationData Embedding Method Using Adaptive Pixel Pair Matching Algorithm
Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Mr. K. Nandha Kumar 1, Mr. R. Anandan 2 1PG Scholar, Department of Electronics and Communication Engineering, Gojan School of Business
More informationScalable VLSI Design for Fast GF(p) Montgomery Inverse Computation
Scalable VLSI Design for Fast GF(p) Montgomery Inverse Computation Adnan Abdul-Aziz Gutub 1, Erkay Savas 2, and Tatiana Kalganova 3 1 Department of Computer Engineering, King Fahd University of Petroleum
More informationArabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub
Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub King Fahd University of Petroleum and Minerals Computer Engineering Department Dhahran
More informationTowards Automatic Recognition of Fonts using Genetic Approach
Towards Automatic Recognition of Fonts using Genetic Approach M. SARFRAZ Department of Information and Computer Science King Fahd University of Petroleum and Minerals KFUPM # 1510, Dhahran 31261, Saudi
More informationA New Image Steganography Based on Decimal-Digits Representation
A New Image Steganography Based on Decimal-Digits Representation Mohammed Abbas Fadhil Al-Husainy Department of multimedia systems, faculty of science and information technology Al-Zaytoonah University
More informationbecause all web objects are not cacheable [3]. Data compression algorithms are applied on the information content of the web object.
Development of an Optimization Algorithm for Internet Data Traffic Syed Misbahuddin and Tariq Ibn Aziz Department of Computer Science and Software Engineering Hail Community College King Fahd University
More informationISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida.
The ISC Int'l Journal of Information Security July 2010, Volume 2, Number 2 (pp. 107 118) http://www.isecure-journal.org High Capacity Steganography Tool for Arabic Text Using Kashida Adnan Abdul-Aziz
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS
ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Abdul-Aziz Gutub, Yousef Salem Elarian, Sameh Mohammad Awaideh, Aleem Khalid Alvi Computer Engineering Department, King Fahd University of Petroleum
More informationObject Recognition using Particle Swarm Optimization on Fourier Descriptors
Object Recognition using Particle Swarm Optimization on Fourier Descriptors Muhammad Sarfraz Ali Taleb Ali Al-Awami King Fahd University of Petroleum and Minerals KFUPM # 1510, Dhahran 31261, Saudi Arabia
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationA Survey on Various Approaches of Image Steganography
A Survey on Various Approaches of Image Priyanka B. Kutade Dept. of E and TC Engg., G.H. Raisoni College of Engg. and Management, University of Pune, Pune, India Parul S. Arora Bhalotra Assistant Professor,
More informationOverview Of Techniques Of Stegnography On Various Media
Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International
More informationA General Framework for the Structural Steganalysis of LSB Replacement
A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding
More informationHyper Edge Detection with Clustering for Data Hiding
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 1, January 2016 Hyper Edge Detection with Clustering for Data Hiding Raniyah
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationBreaking the OutGuess
Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationData Representation COE 301. Computer Organization Prof. Muhamed Mudawar
Data Representation COE 30 Computer Organization Prof. Muhamed Mudawar College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Presentation Outline Positional Number
More informationIN DIGITAL watermarking or steganography, a hardly noticeable
IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL 13, NO 8, AUGUST 2004 1147 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Adnan M Alattar, Member, IEEE Abstract A reversible
More informationA Novel Information Security Scheme using Cryptic Steganography
A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in
More informationExtracting Hidden Messages in Steganographic Images
DIGITAL FORENSIC RESEARCH CONFERENCE Extracting Hidden Messages in Steganographic Images By Tu-Thach Quach Presented At The Digital Forensic Research Conference DFRWS 2014 USA Denver, CO (Aug 3 rd - 6
More informationAvailable online at ScienceDirect. Procedia Computer Science 52 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 52 (2015 ) 1071 1076 The 5 th International Symposium on Frontiers in Ambient and Mobile Systems (FAMS-2015) Health, Food
More informationAbdulmohsin Al Omran and The Family Office
Presented by: Syracuse University Syracuse University s College of Engineering and Computer Science The Maxwell School of Citizenship and Public Affairs at Syracuse University The Institute for National
More informationCOPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University
2011 Eighth International Conference Computer Graphics, Imaging and Visualization COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM Najah Muhammad 1, Muhammad Hussain 2, Ghulam Muhammad 2, and
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationA New Statistical Restoration Method for Spatial Domain Images
A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,
More informationGENETIC ALGORITHM FOR FUNCTION APPROXIMATION: AN EXPERIMENTAL INVESTIGATION
GENETIC ALGORITHM FOR FUNCTION APPROXIMATION: AN EXPERIMENTAL INVESTIGATION Abdulrahman Baqais 1 1 Department of Information and Computer Science, KFUPM, Dhahran, Saudi Arabia ABSTRACT Function Approximation
More informationAudio Text for the Lesson: Counting Systems
Audio Text for the Lesson: Counting Systems Part 1: Introduction (2 minutes) Peace, mercy and blessings of Allah Welcome everyone in this lesson Allow me to introduce myself, my name is Abdullah Saleh
More informationData Hiding on Text Using Big-5 Code
Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationObject Recognition using Particle Swarm Optimization on Fourier Descriptors
Object Recognition using Particle Swarm Optimization on Fourier Descriptors Muhammad Sarfraz 1 and Ali Taleb Ali Al-Awami 2 1 Department of Information and Computer Science, King Fahd University of Petroleum
More informationImproved Qualitative Color Image Steganography Based on DWT
Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V
More informationIAJIT First Online Publication
Fuzzy Modeling for Handwritten Arabic Numeral Recognition Dhiaa Musleh, Khaldoun Halawani and Sabri Mahmoud Information and Computer Science Department, King Fahd University of Petroleum and Minerals Saudi
More informationIMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY
IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,
More informationDue to the many benefits provided by both the third-generation (3G) mobile networks and the IEEE wireless local area networks (WLANs), it is
Performance of UMTS/WLAN Integration at Hot-Spot Locations Using OPNET Marwan Abu-Amara, Ashraf Mahmoud, Tarek Sheltami, Adel Al-Shahrani, Khalid Al-Otaibi, S.M.Rehman, and Taha Anwar {marwan, ashraf,
More informationEvaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors
Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Sahar Q. Saleh 1, Muhammad Hussain 1, Ghulam Muhammad 1, and George Bebis 2 1 College of Computer and Information Sciences,
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationGenetic algorithm for optimal imperceptibility in image communication through noisy channel
Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationMATERIALS PLUS Segmentation Measurement
Example: Segmentation MATERIALS PLUS Segmentation is a method of image partitioning based on the intensity / gray scale range of its components. Since a phase is detected and its area is estimated on the
More informationHashing and Merging Heuristics for Text Reuse Detection
Hashing and Merging Heuristics for Text Reuse Detection Notebook for PAN at CLEF-2014 Faisal Alvi 1, Mark Stevenson 2, Paul Clough 2 1 King Fahd University of Petroleum & Minerals, Saudi Arabia, 2 University
More informationAn Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility
An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan
More informationThe COE Department. Sadiq M. Sait, Ph.D. Department of Computer Engineering
The COE Department Sadiq M. Sait, Ph.D sadiq@kfupm.edu.sa Department of Computer Engineering College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia
More informationApplication of Data Hiding in Audio-Video Using Advance Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,
More informationEfficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering
Efficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering Aiman El-Maleh, Saqib Khurshid King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia
More informationDYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION
DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of
More informationDigital image steganography using LSB substitution, PVD, and EMD
Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationDIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY
DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography
More informationA Framework to Reversible Data Hiding Using Histogram-Modification
A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationDegree University Country Year Ph.D. (EE) Stevens Institute of. USA 2006 Technology M.Phil.(ELEC) Hong Kong University of Hong Kong, China 1995
Curriculum Vitae Name: Dr. Mohamed Abdul Haleem.. Department: EE ME CE CHE ARE ISE (please highlight your department) Education Degree University Country Year Ph.D. (EE) Stevens Institute of 2006 Technology
More informationInformation Cloaking Technique with Tree Based Similarity
Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationCOPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *
COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,
More informationCovert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach
Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationA LOW POWER REMOTE DATA ACQUISITION & CONTROL MODULE FOR OIL INDUSTRY
A LOW POWER REMOTE DATA ACQUISITION & CONTROL MODULE FOR OIL INDUSTRY Mostafa Abd-El-Barr, W. Raad, and Naser Al-Salhabi King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia ABSTRACT.
More informationSteganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image
Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image Khaled Nasser ElSayed Computer Science Department, Umm Al-Qura University Abstract Information transmission is
More informationDr. Mohammed Houssaini Sqalli
Dr. Mohammed Houssaini Sqalli King Fahd University of Petroleum & Minerals P.O. Box 1447 Dhahran 31261, Saudi Arabia sqalli@kfupm.edu.sa Tel: +966-3-860-1725 Fax: +966-3-860-3059 EDUCATION: Ph.D. in Engineering
More informationJeff Hinson CS525, Spring 2010
DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction
More informationDigital Signal Processing
Digital Signal Processing 20 (2010) 1629 1636 Contents lists available at ScienceDirect Digital Signal Processing wwwelseviercom/locate/dsp High capacity lossless data embedding technique for palette images
More informationText Steganography Using Compression and Random Number Generators
Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed
More informationA Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography
A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationAdaptive Steganography Method Based on Two Tiers Pixel Value Differencing
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,
More informationSteganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram
, October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are
More informationInternational Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 5 May , (P) X
Robust and Protected Data Hiding in Natural Image Using Steganography Technique Abha Sharma 1, Prof Shreechandra Upadhyay 2, Prof Rajkumar Paul 3 1 (Research scholar, M.tech in Computer science, VIT Bhopal
More informationArabesque Groups Where Art and Mathematics Meet. Jawad Abuhlail, KFUPM (KSA)
Arabesque Groups Where Art and Mathematics Meet Jawad Abuhlail, KFUPM (KSA) abuhlail@kfupm.edu.sa We thank Saudi Aramco for supporting this Blossom educational video. -------- Arabesque Groups Where Art
More informationARABIC TEXT WATERMARKING : A REVIEW
ARABIC TEXT WATERMARKING : A REVIEW Reem Ahmed Alotaibi 1 AND Lamiaa A. Elrefaei 1,2 1 Computer Science Department, Faculty of Computing & Information Technology, King Abdulaziz University, Jeddah, Saudi
More informationPerformance analysis of Internet applications over an adaptive IEEE MAC architecture
Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed
More informationMultibit Embedding Algorithm for Steganography of Palette-Based Images
Multibit Embedding Algorithm for Steganography of Palette-Based Images Shoko Imaizumi and Kei Ozawa Graduate School of Advanced Integration Science, Chiba University 1 33 Yayoicho, Inage-ku, Chiba-shi,
More informationA Review of Approaches for Steganography
International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2
More informationInteger Multiplication and Division
Integer Multiplication and Division COE 301 Computer Organization Prof. Muhamed Mudawar College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Presentation Outline
More informationImage Steganography (cont.)
Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares
More informationHigh Capacity Reversible Watermarking Scheme for 2D Vector Maps
Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration
More informationTest Vector Decomposition-Based Static Compaction Algorithms for Combinational Circuits
Test Vector Decomposition-Based Static Compaction Algorithms for Combinational Circuits AIMAN H. EL-MALEH and YAHYA E. OSAIS King Fahd University of Petroleum and Minerals Testing system-on-chips involves
More informationScalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2 n )
Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2 n ) Adnan Abdul-Aziz Gutub 1, Alexandre F. Tenca, Erkay Savaş 2, and Çetin K. Koç Department of Electrical & Computer Engineering
More informationUtilizing Diacritic Marks for Arabic Text Steganography
Page 1 of 16 Utilizing Diacritic Marks for Arabic Text Steganography ADNAN A. GUTUB, LAHOUARI M. GHOUTI, YOUSEF S. ELARIAN, SAMEH M. AWAIDEH, ALEEM K. ALVI College of Computer Sciences and Engineering;
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationA QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS
A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of
More informationAn Improved Steganalysis Approach for Breaking the F5 Algorithm
An Improved Steganalysis Approach for Breaking the F5 Algorithm HATIM ABOALSAMH, HASSAN MATHKOUR, SAMI DOKHEEKH, MONA MURSI, GHAZYASSASSA hatim@ccis.ksu.edu.sa, mathkour@ccis.ksu.edu.sa, monmursi@yahoo.com,
More informationAN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE
AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE 1 SITI DHALILA MOHD SATAR, 1 NAZIRAH ABD HAMID, 1 FATIMAH GHAZALI, 1 ROSLINDA MUDA, 1 MOHAMAD AFENDEE MOHAMED 1 Faculty of Informatics and Computing,
More informationA Data Hiding Model for Image Steganography Using Primes: Towards Data Security
International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant
More informationMetamorphosis of High Capacity Steganography Schemes
2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationPiecewise Permutation Steganography for 3D Humanoid Mesh Models
Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw
More informationSTEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE
STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,
More informationOn using Emoticons and Lingoes for Hiding Data in SMS
2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), August 25-27, 2015, Langkawi, Kedah, Malaysia On using Emoticons and Lingoes for Hiding Data in SMS Vahab Iranmanesh*
More informationKing Fahd University of Petroleum and Minerals
King Fahd University of Petroleum and Minerals Department of Information and Computer Science ICS 424-01: Advanced Database Systems Semester 063 Time Allowed: 100 Minutes Student ID: Name: Instructor:
More informationIncreasing Robustness of LSB Audio Steganography Using a Novel Embedding Method
ShriRam College of Engineering & Management 1 Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method Rinki Baghel Pragya Sharma Abstract In this paper, we present a novel high
More information