RGB Intensity Based Variable- Bits Image Steganography

Size: px
Start display at page:

Download "RGB Intensity Based Variable- Bits Image Steganography"

Transcription

1 RGB Intensity Based Variable- Bits Image Steganography 2008 IEEE Asia-Pacific Services Computing Conference (APSCC 2008) 1 st International Workshop on Multimedia, Information Privacy & Intelligent Computing Systems December 9-12, 2008, Yilan, Taiwan Mohammad Tanvir Parvez & Adnan Abdul-Aziz Gutub College of Computer Sciences & Engineering King Fahd University of Petroleum & Minerals (KFUPM) Dhahran, Saudi Arabia

2 Outline The problem Instance Goals Algorithm Idea Step Examples Experimentations Visual and statistical analysis Comparisons Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 2/21

3 The Problem Hide (embed) a file within another file Data File Cover File Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 3/21

4 Applications Hiding copyright info Avoid snooping Data encapsulation E.g. explanatory information within X-ray images Copyright protections Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 4/21

5 Algorithmic Goals Secure Less Distortion Visual Statistical (like Histogram) Not guessable Data location High capacity Not dependent on cover image Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 5/21

6 The Idea Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 6/21

7 Algorithm: Features One channel as indicator Data in one of the other channels Variable-bits per channel Lower color value Higher no of bits Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 7/21

8 Algorithm Outline R G B The Algorithm 1. Chose an indicator 2. Chose the channel 3. Decide no of data bits - Partition scheme 4. Get & store the data [say 1101] 5. Modify the other channel (if needed) Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 8/21

9 Example 50 X: 1 Y: 1 RGB: 255, 255, 255 X: 215 Y: 63 RGB: 33, 8, X: 1 Y: 1 RGB: 254, 255, 255 X: 215 Y: 63 RGB: 33, 8, Up to 7 bits have been modified Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 9/21

10 Expectations Secure Random indicator sequence Statistically undetectable Only lower bits are changed High capacity How much of these can be achieved? Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 10/21

11 Experimentations Cover Image Data File Image size: 640 X 480, Bit depth: 24 No of pixels = Image size: 150 X 117, Bit depth: 24 Data length = bits Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 11/21

12 Experimentations Pixels utilized: Constant 3 bits per channel Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 12/21

13 Experimentations Pixels utilized: /4 bits per channel Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 13/21

14 Experimentations Pixels utilized: Constant 4 bits per channel Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 14/21

15 Experimentations Pixels utilized: /5 bits per channel Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 15/21

16 Histograms Histogram of Red channel: cover image Histogram of Red channel: stego file Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 16/21

17 Histograms Histogram of Green channel: cover image Histogram of Green channel: stego file Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 17/21

18 Histograms Histogram of Blue channel: cover image Histogram of Blue channel: stego file Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 18/21

19 Comparison Technique No of data bits per channel (bits) No of pixels of cover media utilized (pixels) No of pixels of cover media utilized (percentage) Intensity Based Variable-Bits 3 3 or or % 13.37% 12.49% 11.65% Pixel Indicator % 19.22% 14.55% Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 19/21

20 Comparison: High Capacity 50 Our Algorithm Cover Image Pixels utilized: 16.5% Constant 3 bits per channel Pixel Indicator Algorithm Data File Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 20/21

21 Summary New idea in image based steganography Variable-bits per channel High capacity algorithm Secure Random indicator sequence Presented at APSCC 2008 in Taiwan, by Adnan Gutub, from KFUPM, Dhahran. Saudi Arabia 21/21

EE663 Image Processing Histogram Equalization I

EE663 Image Processing Histogram Equalization I EE663 Image Processing Histogram Equalization I Dr. Samir H. Abdul-Jauwad Electrical Engineering Department College of Engineering Sciences King Fahd University of Petroleum & Minerals Dhahran Saudi Arabia

More information

Web Database Connectivity

Web Database Connectivity Web Database Connectivity MUHAMMAD ATIF TAHIR atif@ccse.kfupm.edu.sa Computer Engineering Department King Fahd University of Petroleum and Minerals Dhahran-31261, SAUDI ARABIA Lets get started... The purpose

More information

High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator Technique

High Capacity Image Steganography Method Using LZW, IWT and Modified Pixel Indicator Technique igh Capacity mage Steganography Method Using LZW, WT and Modified Pixel ndicator Technique Swati Goel Pramod Kumar Rekha Saraswat M.Tech(CSE),CDAC Noida M.Tech(T),CDAC Noida Sr. Lecturer (SOT),CDAC Noida

More information

Message Concealment Techniques using Image based Steganography

Message Concealment Techniques using Image based Steganography Message Concealment Techniques using Image based Steganography Farhan Khan and Adnan Abdul-Aziz Gutub Department of Computer Engineering King Fahd University of Petroleum & Minerals, Dhahran, 31261, Saudi

More information

Message Concealment Techniques using Image based Steganography

Message Concealment Techniques using Image based Steganography Message Concealment Techniques using Image based Steganography Farhan Khan and Adnan Abdul-Aziz Gutub Department of Computer Engineering, King Fahd University of Petroleum & Minerals, Dhahran, 31261, Kingdom

More information

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Mr. K. Nandha Kumar 1, Mr. R. Anandan 2 1PG Scholar, Department of Electronics and Communication Engineering, Gojan School of Business

More information

Scalable VLSI Design for Fast GF(p) Montgomery Inverse Computation

Scalable VLSI Design for Fast GF(p) Montgomery Inverse Computation Scalable VLSI Design for Fast GF(p) Montgomery Inverse Computation Adnan Abdul-Aziz Gutub 1, Erkay Savas 2, and Tatiana Kalganova 3 1 Department of Computer Engineering, King Fahd University of Petroleum

More information

Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub

Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub Arabic Diacritics Based Steganography Mohammed A. Aabed, Sameh M. Awaideh, Abdul-Rahman M. Elshafei and Adnan A. Gutub King Fahd University of Petroleum and Minerals Computer Engineering Department Dhahran

More information

Towards Automatic Recognition of Fonts using Genetic Approach

Towards Automatic Recognition of Fonts using Genetic Approach Towards Automatic Recognition of Fonts using Genetic Approach M. SARFRAZ Department of Information and Computer Science King Fahd University of Petroleum and Minerals KFUPM # 1510, Dhahran 31261, Saudi

More information

A New Image Steganography Based on Decimal-Digits Representation

A New Image Steganography Based on Decimal-Digits Representation A New Image Steganography Based on Decimal-Digits Representation Mohammed Abbas Fadhil Al-Husainy Department of multimedia systems, faculty of science and information technology Al-Zaytoonah University

More information

because all web objects are not cacheable [3]. Data compression algorithms are applied on the information content of the web object.

because all web objects are not cacheable [3]. Data compression algorithms are applied on the information content of the web object. Development of an Optimization Algorithm for Internet Data Traffic Syed Misbahuddin and Tariq Ibn Aziz Department of Computer Science and Software Engineering Hail Community College King Fahd University

More information

ISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida.

ISeCure. The ISC Int'l Journal of Information Security. High Capacity Steganography Tool for Arabic Text Using Kashida. The ISC Int'l Journal of Information Security July 2010, Volume 2, Number 2 (pp. 107 118) http://www.isecure-journal.org High Capacity Steganography Tool for Arabic Text Using Kashida Adnan Abdul-Aziz

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS

ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS ARABIC TEXT STEGANOGRAPHY USING MULTIPLE DIACRITICS Adnan Abdul-Aziz Gutub, Yousef Salem Elarian, Sameh Mohammad Awaideh, Aleem Khalid Alvi Computer Engineering Department, King Fahd University of Petroleum

More information

Object Recognition using Particle Swarm Optimization on Fourier Descriptors

Object Recognition using Particle Swarm Optimization on Fourier Descriptors Object Recognition using Particle Swarm Optimization on Fourier Descriptors Muhammad Sarfraz Ali Taleb Ali Al-Awami King Fahd University of Petroleum and Minerals KFUPM # 1510, Dhahran 31261, Saudi Arabia

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

A Survey on Various Approaches of Image Steganography

A Survey on Various Approaches of Image Steganography A Survey on Various Approaches of Image Priyanka B. Kutade Dept. of E and TC Engg., G.H. Raisoni College of Engg. and Management, University of Pune, Pune, India Parul S. Arora Bhalotra Assistant Professor,

More information

Overview Of Techniques Of Stegnography On Various Media

Overview Of Techniques Of Stegnography On Various Media Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International

More information

A General Framework for the Structural Steganalysis of LSB Replacement

A General Framework for the Structural Steganalysis of LSB Replacement A General Framework for the Structural Steganalysis of LSB Replacement Andrew Ker adk@comlab.ox.ac.uk Royal Society University Research Fellow Oxford University Computing Laboratory 7 th Information Hiding

More information

Hyper Edge Detection with Clustering for Data Hiding

Hyper Edge Detection with Clustering for Data Hiding Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 1, January 2016 Hyper Edge Detection with Clustering for Data Hiding Raniyah

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Data Representation COE 301. Computer Organization Prof. Muhamed Mudawar

Data Representation COE 301. Computer Organization Prof. Muhamed Mudawar Data Representation COE 30 Computer Organization Prof. Muhamed Mudawar College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Presentation Outline Positional Number

More information

IN DIGITAL watermarking or steganography, a hardly noticeable

IN DIGITAL watermarking or steganography, a hardly noticeable IEEE TRANSACTIONS ON IMAGE PROCESSING, VOL 13, NO 8, AUGUST 2004 1147 Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform Adnan M Alattar, Member, IEEE Abstract A reversible

More information

A Novel Information Security Scheme using Cryptic Steganography

A Novel Information Security Scheme using Cryptic Steganography A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in

More information

Extracting Hidden Messages in Steganographic Images

Extracting Hidden Messages in Steganographic Images DIGITAL FORENSIC RESEARCH CONFERENCE Extracting Hidden Messages in Steganographic Images By Tu-Thach Quach Presented At The Digital Forensic Research Conference DFRWS 2014 USA Denver, CO (Aug 3 rd - 6

More information

Available online at ScienceDirect. Procedia Computer Science 52 (2015 )

Available online at  ScienceDirect. Procedia Computer Science 52 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 52 (2015 ) 1071 1076 The 5 th International Symposium on Frontiers in Ambient and Mobile Systems (FAMS-2015) Health, Food

More information

Abdulmohsin Al Omran and The Family Office

Abdulmohsin Al Omran and The Family Office Presented by: Syracuse University Syracuse University s College of Engineering and Computer Science The Maxwell School of Citizenship and Public Affairs at Syracuse University The Institute for National

More information

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University

COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM. College of Computer and Information Sciences, Prince Norah Bint Abdul Rahman University 2011 Eighth International Conference Computer Graphics, Imaging and Visualization COPY-MOVE FORGERY DETECTION USING DYADIC WAVELET TRANSFORM Najah Muhammad 1, Muhammad Hussain 2, Ghulam Muhammad 2, and

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

A New Statistical Restoration Method for Spatial Domain Images

A New Statistical Restoration Method for Spatial Domain Images A New Statistical Restoration Method for Spatial Domain Images Arijit Sur 1,,PiyushGoel 2, and Jayanta Mukherjee 2 1 Department of Computer Science and Engineering, Indian Institute of Technology, Guwahati-781039,

More information

GENETIC ALGORITHM FOR FUNCTION APPROXIMATION: AN EXPERIMENTAL INVESTIGATION

GENETIC ALGORITHM FOR FUNCTION APPROXIMATION: AN EXPERIMENTAL INVESTIGATION GENETIC ALGORITHM FOR FUNCTION APPROXIMATION: AN EXPERIMENTAL INVESTIGATION Abdulrahman Baqais 1 1 Department of Information and Computer Science, KFUPM, Dhahran, Saudi Arabia ABSTRACT Function Approximation

More information

Audio Text for the Lesson: Counting Systems

Audio Text for the Lesson: Counting Systems Audio Text for the Lesson: Counting Systems Part 1: Introduction (2 minutes) Peace, mercy and blessings of Allah Welcome everyone in this lesson Allow me to introduce myself, my name is Abdullah Saleh

More information

Data Hiding on Text Using Big-5 Code

Data Hiding on Text Using Big-5 Code Data Hiding on Text Using Big-5 Code Jun-Chou Chuang 1 and Yu-Chen Hu 2 1 Department of Computer Science and Communication Engineering Providence University 200 Chung-Chi Rd., Shalu, Taichung 43301, Republic

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

Object Recognition using Particle Swarm Optimization on Fourier Descriptors

Object Recognition using Particle Swarm Optimization on Fourier Descriptors Object Recognition using Particle Swarm Optimization on Fourier Descriptors Muhammad Sarfraz 1 and Ali Taleb Ali Al-Awami 2 1 Department of Information and Computer Science, King Fahd University of Petroleum

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

IAJIT First Online Publication

IAJIT First Online Publication Fuzzy Modeling for Handwritten Arabic Numeral Recognition Dhiaa Musleh, Khaldoun Halawani and Sabri Mahmoud Information and Computer Science Department, King Fahd University of Petroleum and Minerals Saudi

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

Due to the many benefits provided by both the third-generation (3G) mobile networks and the IEEE wireless local area networks (WLANs), it is

Due to the many benefits provided by both the third-generation (3G) mobile networks and the IEEE wireless local area networks (WLANs), it is Performance of UMTS/WLAN Integration at Hot-Spot Locations Using OPNET Marwan Abu-Amara, Ashraf Mahmoud, Tarek Sheltami, Adel Al-Shahrani, Khalid Al-Otaibi, S.M.Rehman, and Taha Anwar {marwan, ashraf,

More information

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors

Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Evaluation of Image Forgery Detection Using Multi-scale Weber Local Descriptors Sahar Q. Saleh 1, Muhammad Hussain 1, Ghulam Muhammad 1, and George Bebis 2 1 College of Computer and Information Sciences,

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

Genetic algorithm for optimal imperceptibility in image communication through noisy channel

Genetic algorithm for optimal imperceptibility in image communication through noisy channel Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,

More information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Efficient & Secure Data Hiding Using Secret Reference Matrix Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3

More information

MATERIALS PLUS Segmentation Measurement

MATERIALS PLUS Segmentation Measurement Example: Segmentation MATERIALS PLUS Segmentation is a method of image partitioning based on the intensity / gray scale range of its components. Since a phase is detected and its area is estimated on the

More information

Hashing and Merging Heuristics for Text Reuse Detection

Hashing and Merging Heuristics for Text Reuse Detection Hashing and Merging Heuristics for Text Reuse Detection Notebook for PAN at CLEF-2014 Faisal Alvi 1, Mark Stevenson 2, Paul Clough 2 1 King Fahd University of Petroleum & Minerals, Saudi Arabia, 2 University

More information

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility

An Information Hiding Scheme Based on Pixel- Value-Ordering and Prediction-Error Expansion with Reversibility An Information Hiding Scheme Based on Pixel- Value-Ordering Prediction-Error Expansion with Reversibility Ching-Chiuan Lin Department of Information Management Overseas Chinese University Taichung, Taiwan

More information

The COE Department. Sadiq M. Sait, Ph.D. Department of Computer Engineering

The COE Department. Sadiq M. Sait, Ph.D. Department of Computer Engineering The COE Department Sadiq M. Sait, Ph.D sadiq@kfupm.edu.sa Department of Computer Engineering College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia

More information

Application of Data Hiding in Audio-Video Using Advance Algorithm

Application of Data Hiding in Audio-Video Using Advance Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYIGHT POTECTION OF PALETTE IMAGES BY A OBUST LOSSLESS VISIBLE WATEMAKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) and Wen-Hsiang Tsai ( 蔡文祥 ), Dept of Computer Science, National Chiao Tung University, Hsinchu,

More information

Efficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering

Efficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering Efficient Test Compaction for Combinational Circuits Based on Fault Detection Count-Directed Clustering Aiman El-Maleh, Saqib Khurshid King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia

More information

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION

DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION DYADIC WAVELETS AND DCT BASED BLIND COPY-MOVE IMAGE FORGERY DETECTION Ghulam Muhammad*,1, Muhammad Hussain 2, Anwar M. Mirza 1, and George Bebis 3 1 Department of Computer Engineering, 2 Department of

More information

Digital image steganography using LSB substitution, PVD, and EMD

Digital image steganography using LSB substitution, PVD, and EMD Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY

DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 1 DIGITAL STEGANOGRAPHY DIGITAL STEGANOGRAPHY 2 Abstract Steganography derives from a Greek word and means covered writing. It is a sector of computer information security. Cryptography

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

Degree University Country Year Ph.D. (EE) Stevens Institute of. USA 2006 Technology M.Phil.(ELEC) Hong Kong University of Hong Kong, China 1995

Degree University Country Year Ph.D. (EE) Stevens Institute of. USA 2006 Technology M.Phil.(ELEC) Hong Kong University of Hong Kong, China 1995 Curriculum Vitae Name: Dr. Mohamed Abdul Haleem.. Department: EE ME CE CHE ARE ISE (please highlight your department) Education Degree University Country Year Ph.D. (EE) Stevens Institute of 2006 Technology

More information

Information Cloaking Technique with Tree Based Similarity

Information Cloaking Technique with Tree Based Similarity Information Cloaking Technique with Tree Based Similarity C.Bharathipriya [1], K.Lakshminarayanan [2] 1 Final Year, Computer Science and Engineering, Mailam Engineering College, 2 Assistant Professor,

More information

A Study on Different JPEG Steganograhic Schemes

A Study on Different JPEG Steganograhic Schemes A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India

More information

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE *

COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * COPYRIGHT PROTECTION OF PALETTE IMAGES BY A ROBUST LOSSLESS VISIBLE WATERMARKING TECHNIQUE * Pei-Pei Chen ( 陳佩貝 ) 1 and Wen-Hsiang Tsai ( 蔡文祥 ) 1, 2 1 Dept. of Computer Science, National Chiao Tung University,

More information

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach

Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach Covert Communication with Authentication via Software Programs Using Invisible ASCII Codes --- A New Approach I-Shi Lee Dept. of Computer Science, National Chiao Tung University, Hsinchu, Taiwan 30010

More information

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION

AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),

More information

A LOW POWER REMOTE DATA ACQUISITION & CONTROL MODULE FOR OIL INDUSTRY

A LOW POWER REMOTE DATA ACQUISITION & CONTROL MODULE FOR OIL INDUSTRY A LOW POWER REMOTE DATA ACQUISITION & CONTROL MODULE FOR OIL INDUSTRY Mostafa Abd-El-Barr, W. Raad, and Naser Al-Salhabi King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia ABSTRACT.

More information

Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image

Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image Steganography: Applying and Evaluating Two Algorithms for Embedding Audio Data in an Image Khaled Nasser ElSayed Computer Science Department, Umm Al-Qura University Abstract Information transmission is

More information

Dr. Mohammed Houssaini Sqalli

Dr. Mohammed Houssaini Sqalli Dr. Mohammed Houssaini Sqalli King Fahd University of Petroleum & Minerals P.O. Box 1447 Dhahran 31261, Saudi Arabia sqalli@kfupm.edu.sa Tel: +966-3-860-1725 Fax: +966-3-860-3059 EDUCATION: Ph.D. in Engineering

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

Digital Signal Processing

Digital Signal Processing Digital Signal Processing 20 (2010) 1629 1636 Contents lists available at ScienceDirect Digital Signal Processing wwwelseviercom/locate/dsp High capacity lossless data embedding technique for palette images

More information

Text Steganography Using Compression and Random Number Generators

Text Steganography Using Compression and Random Number Generators Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing

Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,

More information

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram

Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram , October 24-26, 2012, San Francisco, USA Steganography using Odd-even Based Embedding and Compensation Procedure to Restore Histogram Neeta Nain, Jaideep Singh, Ishan Dayma, Rajesh Meena The authors are

More information

International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 5 May , (P) X

International Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 5 May , (P) X Robust and Protected Data Hiding in Natural Image Using Steganography Technique Abha Sharma 1, Prof Shreechandra Upadhyay 2, Prof Rajkumar Paul 3 1 (Research scholar, M.tech in Computer science, VIT Bhopal

More information

Arabesque Groups Where Art and Mathematics Meet. Jawad Abuhlail, KFUPM (KSA)

Arabesque Groups Where Art and Mathematics Meet. Jawad Abuhlail, KFUPM (KSA) Arabesque Groups Where Art and Mathematics Meet Jawad Abuhlail, KFUPM (KSA) abuhlail@kfupm.edu.sa We thank Saudi Aramco for supporting this Blossom educational video. -------- Arabesque Groups Where Art

More information

ARABIC TEXT WATERMARKING : A REVIEW

ARABIC TEXT WATERMARKING : A REVIEW ARABIC TEXT WATERMARKING : A REVIEW Reem Ahmed Alotaibi 1 AND Lamiaa A. Elrefaei 1,2 1 Computer Science Department, Faculty of Computing & Information Technology, King Abdulaziz University, Jeddah, Saudi

More information

Performance analysis of Internet applications over an adaptive IEEE MAC architecture

Performance analysis of Internet applications over an adaptive IEEE MAC architecture Journal of the Franklin Institute 343 (2006) 352 360 www.elsevier.com/locate/jfranklin Performance analysis of Internet applications over an adaptive IEEE 802.11 MAC architecture Uthman Baroudi, Mohammed

More information

Multibit Embedding Algorithm for Steganography of Palette-Based Images

Multibit Embedding Algorithm for Steganography of Palette-Based Images Multibit Embedding Algorithm for Steganography of Palette-Based Images Shoko Imaizumi and Kei Ozawa Graduate School of Advanced Integration Science, Chiba University 1 33 Yayoicho, Inage-ku, Chiba-shi,

More information

A Review of Approaches for Steganography

A Review of Approaches for Steganography International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2

More information

Integer Multiplication and Division

Integer Multiplication and Division Integer Multiplication and Division COE 301 Computer Organization Prof. Muhamed Mudawar College of Computer Sciences and Engineering King Fahd University of Petroleum and Minerals Presentation Outline

More information

Image Steganography (cont.)

Image Steganography (cont.) Image Steganography (cont.) 2.2) Image Steganography: Use of Discrete Cosine Transform (DCT) DCT is one of key components of JPEG compression JPEG algorithm: (1) algorithm is split in 8x8 pixel squares

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Test Vector Decomposition-Based Static Compaction Algorithms for Combinational Circuits

Test Vector Decomposition-Based Static Compaction Algorithms for Combinational Circuits Test Vector Decomposition-Based Static Compaction Algorithms for Combinational Circuits AIMAN H. EL-MALEH and YAHYA E. OSAIS King Fahd University of Petroleum and Minerals Testing system-on-chips involves

More information

Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2 n )

Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2 n ) Scalable and Unified Hardware to Compute Montgomery Inverse in GF(p) and GF(2 n ) Adnan Abdul-Aziz Gutub 1, Alexandre F. Tenca, Erkay Savaş 2, and Çetin K. Koç Department of Electrical & Computer Engineering

More information

Utilizing Diacritic Marks for Arabic Text Steganography

Utilizing Diacritic Marks for Arabic Text Steganography Page 1 of 16 Utilizing Diacritic Marks for Arabic Text Steganography ADNAN A. GUTUB, LAHOUARI M. GHOUTI, YOUSEF S. ELARIAN, SAMEH M. AWAIDEH, ALEEM K. ALVI College of Computer Sciences and Engineering;

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS

A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS Syed S. Rizvi 1, Aasia Riasat 2, and Khaled M. Elleithy 3 1 Computer Science and Engineering Department, University of

More information

An Improved Steganalysis Approach for Breaking the F5 Algorithm

An Improved Steganalysis Approach for Breaking the F5 Algorithm An Improved Steganalysis Approach for Breaking the F5 Algorithm HATIM ABOALSAMH, HASSAN MATHKOUR, SAMI DOKHEEKH, MONA MURSI, GHAZYASSASSA hatim@ccis.ksu.edu.sa, mathkour@ccis.ksu.edu.sa, monmursi@yahoo.com,

More information

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE

AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE 1 SITI DHALILA MOHD SATAR, 1 NAZIRAH ABD HAMID, 1 FATIMAH GHAZALI, 1 ROSLINDA MUDA, 1 MOHAMAD AFENDEE MOHAMED 1 Faculty of Informatics and Computing,

More information

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security

A Data Hiding Model for Image Steganography Using Primes: Towards Data Security International Journal of Computational Engineering & Management, Vol. 15 Issue 3, May 2012 www..org 1 A Data Hiding Model for Image Steganography Using Primes: Towards Data Security Mamatha.T Assistant

More information

Metamorphosis of High Capacity Steganography Schemes

Metamorphosis of High Capacity Steganography Schemes 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt

More information

Piecewise Permutation Steganography for 3D Humanoid Mesh Models

Piecewise Permutation Steganography for 3D Humanoid Mesh Models Piecewise Permutation Steganography for 3D Humanoid Mesh Models Hsin-Chih Lin* and Shan-Jhu Lin Department of Information and Learning Technology National University of Tainan Tainan City, Taiwan * hclin@mail.nutn.edu.tw

More information

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE

STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE STEGANOGRAPHIC SECURE DATA COMMUNICATION USING ZIGBEE MR.NITIN B.NAIK, MRS.ARCHANA NITIN NAIK Vice-Principal, Sharad Institute of Technology,Polytechnic, Yadrav,Dist.Kolhapur(Maharashtra),India HOD E&TC,

More information

On using Emoticons and Lingoes for Hiding Data in SMS

On using Emoticons and Lingoes for Hiding Data in SMS 2015 International Symposium on Technology Management and Emerging Technologies (ISTMET), August 25-27, 2015, Langkawi, Kedah, Malaysia On using Emoticons and Lingoes for Hiding Data in SMS Vahab Iranmanesh*

More information

King Fahd University of Petroleum and Minerals

King Fahd University of Petroleum and Minerals King Fahd University of Petroleum and Minerals Department of Information and Computer Science ICS 424-01: Advanced Database Systems Semester 063 Time Allowed: 100 Minutes Student ID: Name: Instructor:

More information

Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method

Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method ShriRam College of Engineering & Management 1 Increasing Robustness of LSB Audio Steganography Using a Novel Embedding Method Rinki Baghel Pragya Sharma Abstract In this paper, we present a novel high

More information