Electrical & Electronics Engineering, SASTRA University, Thanjavur, Tamil Nadu, India.
|
|
- Earl Quinn
- 5 years ago
- Views:
Transcription
1 Volume 119 No , ISSN: (on-line version) url: Fuzzy Inference System for adaptive data embedding in compressive sense C. Lakshmi 1, N.Nivetha 2, S.Nithya 2, K. Thenmozhi 1, and Rengarajan Amirtharajan 1 1 Faculty & 2 Students,Department of Electronics and Communication Engineering, School of Electrical & Electronics Engineering, SASTRA University, Thanjavur, Tamil Nadu, India. Abstract: ' lakshmi_c@ece.sastra.edu@ ece.sastra.edu *Corresponding author: C. Lakshmi Recent days most of the information are transmitted over internet. Data security plays important role in information sharing over internet. There was a problem with this data transmission over open channel such as copy right, hackers and so on. Communication might be effective if it secured. Information hiding is a way to achieve data security by hiding the secret data into cover medium. In recent time artificial intelligence and fuzzy logic have created the impact on entire science area. In this paper important characteristics of image was taken into account that changes in high frequency components was less sensitive than changes made in low frequency component. This scheme utilizes the fuzzy logic for adaptive edge detection and Arithmetic coding for secret data compression which enhances the payload. This scheme has been verified with various images and different size of payload. Results have been proved the effectiveness of the proposed method. Keywords: Fuzzy inference system (FIS), Arithmetic coding, soft and hard edge detection 1. Introduction: LSB insertion techniques modify the portion of LSBs of the image pixel with the secret bits of same length [1]. The entire pixel in the image will not have equal tolerance to accept the modification.hsv aided LSB method to overcome this problem [2]. Similar way embedding might be done in transform domain, frequency of the pixel has grouped as high and low frequency group and anything might be a elected group for embedding as concern of perceptual transparency of watermarked image or robustness of secret data respectively [3,4]. Edge detection methods assist to choose appropriate pixel for higher payload. Because pixel belonging to edge area has less sensitive to the human eye than pixel belonging to the smooth area [3, 4]. Pixel Variable Differencing (PVD) technique is another way to notify the pixel difference between the neighbors to decide the number bits to be embedded [6, 7]. Optical Pixel Adjustment Process (OPAP) reduces the MSE with higher pay load [8]. Rubik s cube enhances the complexity of the hiding way in terms of randomizing the road path for pixel modification [9]. 447
2 Adaptive way of embedding is required to achieve higher payload without affecting the PSNR. This can be attained by the method which identifies the appropriate pixel withstand against higher modification. Fuzzy [5] logic is the best way to achieve the above. Lossless compression will be an additional support to reach the goal. Hence this paper focuses the followings Fuzzy rule based image edge detector Adaptive embedding technique Higher embedding capacity through arithmetic coding 2. Proposed Method: Figure.1: Intelligent embedding scheme Figure.1 enlightens the significance of FIS and Arithmetic coding in variable secret data embedding. Proposed Algorithm: Phase.1: Edge detection using FIS Step 1: Convert the given color image into gray image I[x, y] to obtain the proper luminance value Step 2: Obtain the image gradient along with both x and y axis Step 2.1: Choose the scaling factor with respect to the gray image. Step 2.2: Choose the kernel for convolution such as 448
3 Gx 1 1 (1) Gy Gx (2) Step 2.3: Find the convolution between the I[x, y] and G X & I and G Y I[ m. n] GX [ m, n] I[ x, y] G[ m x, n y] (3) x y Step 3: Create a fuzzy inference system (FIS) for edge detection Step 3.1: Convert input variables into fuzzy variable using Gaussian membership function k x G( x : k, ) e (4) Where k parameter that determines the rate at which for each x the function increases or decreases with increasing difference ( x) and is the value for which membership grade is 1. Step 3.2: Choose the fuzzy output variable Iy Step 4: Specify FIS Rules r1 soft edge if I X & I y 0 (5) r2 hard edge if I & I 0 (6) X y Step 5: Evaluate the output of the edge detector for each row of pixels in I using corresponding rows of Ix and Iy as inputs. Fuzzy edge detector classifies the pixels into three clusters such as non edge pixels, soft edge pixels, hard edge pixels. Phase.2: Lossless compression on secret text Step 6: Get the first character and find the probability for the character between 0 to 1. Step 7: Find the next upcoming character and sub range related to previous character. Step 8: Find the encoded tag for the word. Step 9: Repeat the step 6 to step 8 for the remaining words till the last word of the sentence which to be transmitted. Phase.3: Embedding the compressed text Step 10: Chop the Compressed text into number of pieces, each piece may have 2, 3 or 4 bits. 449
4 Step 11: Embedding the secret data of 2 bits, 3 bits and 4 bits into non edge, soft edge, and hard edge respectively. 3. Results and Discussion: The proposed method analyzed with five number of images such as Krishna, Penguins, Bear, Superman, City of size of 256 X 256 and different size of secret text have been taken to verify the embedding capacity. (a) (b) (c) (d) (e) Figure.2: Sample input image: (a) Krishna (b) Penguins (c) Bear (d) Superman (e) City (a) (b) (c) (e) (f) (g) Figure.3: (a,e) Input image (b,f) Edge highlighted image (c,g) Watermarked image 450
5 Figure.3 conveys that watermarked image is much similar to the original image, this proves that hard edges withstand the higher payload than soft edges. Figure.4: Fuzzy output rules Figure.4 expresses that comparing the gradient of every pixel in the x and y directions. If the gradient for a pixel is not zero, then the pixel belongs to an edge (black). Table.1: Perceptual transparency between original and watermarked images 1.1 Using Arithmetic code: Image Text Size= 100 Text Size=75 Text size=50 Text size=25 Text size=20 MSE PSNR MSE PSNR MSE PSNR MSE PSNR MSE PSNR Krishna Penguins Koala Vivekanada Lighthouse Without Arithmetic code Image Text Size= 100 Text Size=75 Text size=50 Text size=25 Text size=20 MSE PSNR MSE PSNR MSE PSNR MSE PSNR MSE PSNR 451
6 Krishna Penguins Koala Vivekanada Lighthouse FIS edge detection technique for data embedding is verified with and without lossless compression and the results are tabulated in Table 1.1 and Table 1.2.These tabulated values are proved that FIS edge detection technique supports higher embedding capacity and additionally arithmetic lossless compression enhances the payload. 4. Conclusion: References: Conventional method such as hard thersholding is not right way to identify the image edges, because images should not have sharp boundary for edge detection. This proposed method have grouped the pixels into three clusters such as smooth pixels, soft edge pixels and hard edge pixels. This groping have been provided the opportunity to manipulate different payload with different pixel group. FIS have been optimized the edge embedding technique. These ideas have been verified through parameters. In addition Arithmetic Lossless compression method has supported the higher pay load and 100% of secret data recovery. [1]. Petitcolas, F. A. P., R. J. Anderson, and M. G. Kuhn. "Information Hiding - a Survey." Proceedings of the IEEE, vol. 87, no. 7, 1999, pp , SCOPUS, doi: / [2]. Carvajal-Gamez, B. E., F. J. Gallegos-Funes, and A. J. Rosales-Silva. "Color Local Complexity Estimation Based Steganographic (CLCES) Method." Expert Systems with Applications, vol. 40, no. 4, 2013, pp , SCOPUS, doi: /j.eswa [3]. Uma Maheswari, S., and D. Jude Hemanth. "Performance Enhanced Image Steganography Systems using Transforms and Optimization Techniques." Multimedia Tools and Applications, vol. 76, no. 1, 2017, pp , SCOPUS, doi: /s [4]. Cheddad, A., et al. "Digital Image Steganography: Survey and Analysis of Current Methods." Signal Processing, vol. 90, no. 3, 2010, pp , SCOPUS, doi: /j.sigpro [5]. S.Abinaya G.Arulkumaran DETECTING BLACK HOLE ATTACK USING FUZZY TRUST APPROACH IN MANET International Journal of Innovations in Scientific and Engineering Research (IJISER),vol4,no3,pp ,
7 [6]. Sahu, A. K., and G. Swain. "A Review on LSB Substitution and PVD Based Image Steganography Techniques." Indonesian Journal of Electrical Engineering and Computer Science, vol. 2, no. 3, 2016, pp , SCOPUS, doi: /ijeecs.v2.i3.pp [7]. Shaik, A., V. Thanikaiselvan, and R. Amitharajan. "Data Security through Data Hiding in Images: A Review." Journal of Artificial Intelligence, vol. 10, no. 1, 2017, pp. 1-21, SCOPUS, doi: /jai [8]. Duric, Z., M. Jacobs, and S. Jajodia. Information Hiding: Steganography and Steganalysis, vol. 24, 2004, SCOPUS,, doi: /s (04) [9]. Amirtharajan, R., V. M. Abhiram, G. Revathi, B. J. Reddy, V. Thanikaiselvan, and M. B. B. Rayappan "Rubik's Cube: A Way for Random Image Steganography." Research Journal of Information Technology 5 (3): doi: /rjit
8 454
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB
Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationA Revisit to LSB Substitution Based Data Hiding for Embedding More Information
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia
More informationVARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS
VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com
More informationDigital Image Steganography Using Bit Flipping
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using
More informationDigital Image Steganography Techniques: Case Study. Karnataka, India.
ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College
More informationEFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY
EFFICIENT METHOD FOR HIDING DATA BY PIXEL INTENSITY M.Shobana # 1, R.Manikandan *2 #1 Department School of Computing, SASTRA University, Thanjavur,TamilNadu, India. *2 Senior Asst Prof, School of Computing,
More informationEnhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack
2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of
More informationAbstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction
A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor
More informationUser-Friendly Sharing System using Polynomials with Different Primes in Two Images
User-Friendly Sharing System using Polynomials with Different Primes in Two Images Hung P. Vo Department of Engineering and Technology, Tra Vinh University, No. 16 National Road 53, Tra Vinh City, Tra
More informationResearch Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature
Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:
More informationA New Approach to Compressed Image Steganography Using Wavelet Transform
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography
More informationFuzzy Inference System based Edge Detection in Images
Fuzzy Inference System based Edge Detection in Images Anjali Datyal 1 and Satnam Singh 2 1 M.Tech Scholar, ECE Department, SSCET, Badhani, Punjab, India 2 AP, ECE Department, SSCET, Badhani, Punjab, India
More informationHyper Edge Detection with Clustering for Data Hiding
Journal of Information Hiding and Multimedia Signal Processing c 2016 ISSN 2073-4212 Ubiquitous International Volume 7, Number 1, January 2016 Hyper Edge Detection with Clustering for Data Hiding Raniyah
More informationHybrid Stegnography using ImagesVaried PVD+ LSB Detection Program
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti
More informationAppendix A. Definition of Terms
Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted
More informationHorse Riding & Hiding in Image for Data Guarding
Available online at www.sciencedirect.com Procedia Engineering 30 (2012) 36 44 International Conference on Communication Technology and System Design 2011 Horse Riding & Hiding in Image for Data Guarding
More informationImplementation Of Fuzzy Controller For Image Edge Detection
Implementation Of Fuzzy Controller For Image Edge Detection Anjali Datyal 1 and Satnam Singh 2 1 M.Tech Scholar, ECE Department, SSCET, Badhani, Punjab, India 2 AP, ECE Department, SSCET, Badhani, Punjab,
More informationAn Enhanced Edge Adaptive Steganography Approach using Threshold Value for Region Selection
An Enhanced Edge Adaptive Steganography Approach using Value for Region Selection Abstract Sachin Mungmode 1, R. R. Sedamkar 2 and Niranjan Kulkarni 3 1 Department of Computer Engineering, Mumbai University,
More informationA Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector
A Novel Spatial Domain Invisible Watermarking Technique Using Canny Edge Detector 1 Vardaini M.Tech, Department of Rayat Institute of Engineering and information Technology, Railmajra 2 Anudeep Goraya
More informationAdaptive Pixel Pair Matching Technique for Data Embedding
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationCHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction
CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation
More informationDigital image steganography using LSB substitution, PVD, and EMD
Digital image steganography using LSB substitution, PVD, and EMD Anita Pradhan, K. Raja Sekhar, Gandharba Swain* Department of Computer Science and Engineering, K L University, Vaddeswaram-522502, Andhra
More information2
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 2018 International Conference on Information and Communications Technology (ICOIACT) An Improved
More informationOTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi
OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting
More informationShubha Dubey Dept. of computer science) Radharaman institute of technology and science bhopal, india
International Journal of Scientific & Engineering Research, Volume 7, Issue 2, February-2016 417 Various JPEG Image Steganography Techniques: A Review Priyanka Pal Dept. of computer science Radharaman
More informationReversible Data Hiding VIA Optimal Code for Image
Vol. 3, Issue. 3, May - June 2013 pp-1661-1665 ISSN: 2249-6645 Reversible Data Hiding VIA Optimal Code for Image Senthil Rani D. #, Gnana Kumari R. * # PG-Scholar, M.E-CSE, Coimbatore Institute of Engineering
More informationEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3
More informationAN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS
AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan
More informationDATA- FILE SECURITY ENCRYPTION ALGORITHM
DATA- FILE SECURITY ENCRYPTION ALGORITHM Krishanu Prabha Sinha Computer Science Department, Visvesvaraya Technological University, East West Institute of Technology Off Magadi Road, Vishwaneedam Post BANGALORE
More informationText Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography
Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon
More informationA Framework to Reversible Data Hiding Using Histogram-Modification
A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya
More informationReversible Data Hiding in Colour Images using AES Data Encryption System
Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,
More informationResearch Article A Novel Image Data Hiding Scheme with Diamond Encoding
Hindawi Publishing Corporation EURASIP Journal on Information Security Volume 9, Article ID 65847, 9 pages doi:.55/9/65847 Research Article A Novel Image Data Hiding Scheme with Diamond Encoding Ruey-Ming
More informationSURVEY ON IMAGE PROCESSING IN THE FIELD OF DE-NOISING TECHNIQUES AND EDGE DETECTION TECHNIQUES ON RADIOGRAPHIC IMAGES
SURVEY ON IMAGE PROCESSING IN THE FIELD OF DE-NOISING TECHNIQUES AND EDGE DETECTION TECHNIQUES ON RADIOGRAPHIC IMAGES 1 B.THAMOTHARAN, 2 M.MENAKA, 3 SANDHYA VAIDYANATHAN, 3 SOWMYA RAVIKUMAR 1 Asst. Prof.,
More informationInternational Journal of Science and Engineering Research (IJ0SER), Vol 3 Issue 5 May , (P) X
Robust and Protected Data Hiding in Natural Image Using Steganography Technique Abha Sharma 1, Prof Shreechandra Upadhyay 2, Prof Rajkumar Paul 3 1 (Research scholar, M.tech in Computer science, VIT Bhopal
More informationA Hybrid Method of Hiding The Text Information Using Stegnography
A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com
More informationA Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution
Volume 6, Issue 8, August 2017, ISSN: 2278 1323 A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Suman, Dr. Sukhjeet Kaur Ranade Abstract In this paper a technique
More informationA Image Steganography based on Non-uniform Rectangular Partition
120 A Image Steganography based on Non-uniform Rectangular Partition Venkata Ramesh Pokala Y. Dasradh Ram Reddy G. Srinivasa Reddy BVSR, Chimakurthy, A.P BVSR, Chimakurthy, A.P BVSR, Chimakurthy, A.P Abstract
More informationHighly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting
More informationRandom Image Embedded in Videos using LSB Insertion Algorithm
Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.
More informationSecured Double Layer Data Hiding Using Encryption and Decryption Techniques
Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet
More informationRobust DWT Based Technique for Digital Watermarking
Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information
More informationRobust Steganography Using Texture Synthesis
Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,
More informationComparative Analysis of Edge Detection Algorithms Based on Content Based Image Retrieval With Heterogeneous Images
Comparative Analysis of Edge Detection Algorithms Based on Content Based Image Retrieval With Heterogeneous Images T. Dharani I. Laurence Aroquiaraj V. Mageshwari Department of Computer Science, Department
More informationKeywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM
Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information
More informationSECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING
International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationInternational Journal of Computer Engineering and Applications,
International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY
More informationSecret Image Sharing Scheme Based on a Boolean Operation
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0023 Secret Image Sharing Scheme Based
More informationCHAPTER 8. Conclusions and Future Work
CHAPTER 8 Conclusions and Future Work The growth of modern communication needs a special means of security especially on computer network. As there appears a risk that the sensitive information transmitted
More informationA Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach
www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions
More informationJNTUWORLD. 4. Prove that the average value of laplacian of the equation 2 h = ((r2 σ 2 )/σ 4 ))exp( r 2 /2σ 2 ) is zero. [16]
Code No: 07A70401 R07 Set No. 2 1. (a) What are the basic properties of frequency domain with respect to the image processing. (b) Define the terms: i. Impulse function of strength a ii. Impulse function
More informationOptimized Watermarking Using Swarm-Based Bacterial Foraging
Journal of Information Hiding and Multimedia Signal Processing c 2009 ISSN 2073-4212 Ubiquitous International Volume 1, Number 1, January 2010 Optimized Watermarking Using Swarm-Based Bacterial Foraging
More informationApplication of Data Hiding in Audio-Video Using Advance Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationAN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION
AN IMPROVISED LOSSLESS DATA-HIDING MECHANISM FOR IMAGE AUTHENTICATION BASED HISTOGRAM MODIFICATION Shaik Shaheena 1, B. L. Sirisha 2 VR Siddhartha Engineering College, Vijayawada, Krishna, Andhra Pradesh(520007),
More informationLITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network Jasmeet Kaur 1, Nitika Kapoor 2, Harish Kundra 3
LITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network Jasmeet Kaur 1, Nitika Kapoor 2, Harish Kundra 3 1 Research Scholar, 2,3 Assistant Professor 1,2,3 Department of Computer
More informationEnhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation
Enhanced Hybrid Compound Image Compression Algorithm Combining Block and Layer-based Segmentation D. Maheswari 1, Dr. V.Radha 2 1 Department of Computer Science, Avinashilingam Deemed University for Women,
More informationAdaptive Steganography Method Based on Two Tiers Pixel Value Differencing
Adaptive Steganography Method Based on Two Tiers Pixel Value Differencing Chi-Yao Weng 1, Yen-Chia Huang 1, Chin-Feng Lee 2(&), and Dong-Peng Lin 2 1 Department of Computer Science, National Pingtung University,
More informationA Image Steganography based on Non-uniform Rectangular Partition
A Image Steganography based on Non-uniform Rectangular Partition Venkata Ramesh Pokala 1, Y. Dasradh Ram Reddy 2, G. Srinivasa Reddy 3 Asst.Prof of CSE department BVSR, Chimakurthy, A.P, India Abstract:
More informationQR Code Watermarking Algorithm based on Wavelet Transform
2013 13th International Symposium on Communications and Information Technologies (ISCIT) QR Code Watermarking Algorithm based on Wavelet Transform Jantana Panyavaraporn 1, Paramate Horkaew 2, Wannaree
More informationReview On Secrete Sharing Scheme for Color Image Steganography
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 5 (2014), pp. 485-490 International Research Publications House http://www. irphouse.com /ijict.htm Review
More informationA BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD BASED ON HISTOGRAM MODIFICATION AND VISUAL CRYPTOGRAPHY. Hang-Yu Fan and Zhe-Ming Lu
International Journal of Innovative Computing, Information and Control ICIC International c 2016 ISSN 1349-4198 Volume 12, Number 2, April 2016 pp. 395 405 A BTC-COMPRESSED DOMAIN INFORMATION HIDING METHOD
More informationAn Improved Performance of Watermarking In DWT Domain Using SVD
An Improved Performance of Watermarking In DWT Domain Using SVD Ramandeep Kaur 1 and Harpal Singh 2 1 Research Scholar, Department of Electronics & Communication Engineering, RBIEBT, Kharar, Pin code 140301,
More informationComparative Analysis of 2-Level and 4-Level DWT for Watermarking and Tampering Detection
International Journal of Latest Engineering and Management Research (IJLEMR) ISSN: 2455-4847 Volume 1 Issue 4 ǁ May 2016 ǁ PP.01-07 Comparative Analysis of 2-Level and 4-Level for Watermarking and Tampering
More informationRobust Image Watermarking based on Discrete Wavelet Transform, Discrete Cosine Transform & Singular Value Decomposition
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 8 (2013), pp. 971-976 Research India Publications http://www.ripublication.com/aeee.htm Robust Image Watermarking based
More informationA Study on Different JPEG Steganograhic Schemes
A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India
More informationII. RELATIVE WORK The earlier watermarking techniques were proposed for data hiding applications only [2, 7]. Then, the authentication capability beca
ROI based Tamper Detection and Recovery for Medical Images Using Reversible Watermarking Technique Osamah M. Al-Qershi, Bee Ee Khoo School of Electrical and Electronic Engineering Universiti Sains Malaysia
More informationSECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES
VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi
More informationImproving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique
Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique Sarita R. Visavalia 1, Dr. Amit Ganatra 2 1 Department of Information Technology, CHARUSAT, India 2 Dpartmentof Computer
More information488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 3, NO. 3, SEPTEMBER 2008
488 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 3, NO 3, SEPTEMBER 2008 Adaptive Data Hiding in Edge Areas of Images With Spatial LSB Domain Systems Cheng-Hsing Yang, Chi-Yao Weng, Shiuh-Jeng
More informationOverview Of Techniques Of Stegnography On Various Media
Overview Of Techniques Of Stegnography On Various Media Ms. Arpana Chaturvedi,, Jagannath International Management School, Vasant Kunj, Email: pcord.bca@jagannath.org Ms.Poonam Verma, Jagannath International
More informationData Embedding Method Using Adaptive Pixel Pair Matching Algorithm
Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Mr. K. Nandha Kumar 1, Mr. R. Anandan 2 1PG Scholar, Department of Electronics and Communication Engineering, Gojan School of Business
More informationGenetic algorithm for optimal imperceptibility in image communication through noisy channel
Genetic algorithm for optimal imperceptibility in image communication through noisy channel SantiP.Maity 1, Malay K. Kundu 2 andprasantak.nandi 3 1 Bengal Engineering College (DU), P.O.-Botanic Garden,
More informationCombining TCP and UDP for Secure Data Transfer
ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Indian Journal of Science and Technology, Vol 8(S9), 285 291, May 2015 DOI: 10.17485/ijst/2015/v8iS9/65569 Combining TCP and UDP for Secure Data Transfer
More informationA Reversible Data Hiding Scheme for BTC- Compressed Images
IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game
More informationPROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET SHARING SCHEME
Volume 118 No. 18 2018, 2127-2132 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PROTECTION OF PASSWORD USING TEXT STEGANOGRAPHY AND THRESHOLD SECRET
More informationImage Steganography Method Using Integer Wavelet Transform
ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference
More informationA NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME
VOL 13, NO 13, JULY 2018 ISSN 1819-6608 2006-2018 Asian Research Publishing Network (ARPN) All rights reserved wwwarpnjournalscom A NOVEL SECURED BOOLEAN BASED SECRET IMAGE SHARING SCHEME Javvaji V K Ratnam
More informationRegion Based Even Odd Watermarking Method With Fuzzy Wavelet
Region Based Even Odd Watermarking Method With Fuzzy Wavelet S.Maruthuperumal 1, G.Rosline Nesakumari 1, Dr.V.Vijayakumar 2 1 Research Scholar, Dr.MGR University Chennai. Associate Professor, GIET Rajahmundry,
More informationA NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON DWT WITH SVD
A NEW ROBUST IMAGE WATERMARKING SCHEME BASED ON WITH S.Shanmugaprabha PG Scholar, Dept of Computer Science & Engineering VMKV Engineering College, Salem India N.Malmurugan Director Sri Ranganathar Institute
More informationA Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing
A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing Jasvinder Singh 1, Mehak Aggarwal 2, Kulbhushan Singla 3 1Student M.Tech Dept. of Computer
More informationA reversible data hiding based on adaptive prediction technique and histogram shifting
A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn
More informationOpen Access Side-Informed Image Watermarking Scheme Based on Dither Modulation in the Frequency Domain
Send Orders for Reprints to reprints@benthamscience.net The Open Signal Processing Journal, 2013, 5, 1-6 1 Open Access Side-Informed Image ing Scheme Based on Dither Modulation in the Frequency Domain
More informationA Performance of Embedding Process for Text Steganography Method
A Performance of Embedding Process for Text Steganography Method BAHARUDIN OSMAN 1, ROSHIDI DIN 1, TUAN ZALIZAM TUAN MUDA 2, MOHD. NIZAM OMAR 1, School of Computing 1, School of Multimedia Technology and
More informationIMPROVED ALGORITHM FOR VISUAL CRYPTOGRAPHY USING REGION INCREMENTATION
Int. J. Engg. Res. & Sci. & Tech. 24 Priyanka Agrawal and Vijay Kumar Sharma, 24 Research Paper ISSN 239-599 www.ijerst.com Vol. 3, No. 4, November 24 24 IJERST. All Rights Reserved IMPROVED ALGORITHM
More informationA Survey on Edge Detection Techniques using Different Types of Digital Images
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.694
More informationResearch Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography
Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing
More informationWatermarking Moble Phone Color Images With Error Correction Codes
IOSR Journal of Electronics & Communication Engineering (IOSR-JECE) ISSN(e) : 2278-1684 ISSN(p) : 2320-334X, PP 05-09 www.iosrjournals.org Watermarking Moble Phone Color Images With Error Correction Codes
More informationAnalysis of Information Hiding Techniques in HEVC.
Analysis of Information Hiding Techniques in HEVC. Multimedia Processing EE 5359 spring 2015 Advisor: Dr. K. R. Rao Department of Electrical Engineering University of Texas, Arlington Rahul Ankushrao Kawadgave
More informationA Formula Diamond Encoding Data Hiding Scheme
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 A Formula Diamond Encoding Data Hiding Scheme Wen-Chung Kuo
More informationA Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]
RESEARCH ARTICLE A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2] Department of Computer Science & Engineering [1] Dr. BAMU University, Osmanabad Department of Electronics
More informationDATA hiding [1] and watermarking in digital images
14 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 6, NO. 1, MARCH 2011 Data Hiding in Motion Vectors of Compressed Video Based on Their Associated Prediction Error Hussein A. Aly, Member,
More informationImage Steganography Technique By Using Braille Method of Blind People (LSBraille)
Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt
More informationDesign of Fuzzy Inference System for Contrast Enhancement of Color Images
Design of Fuzzy Inference System for Contrast Enhancement of Color Images Nutan Y. Suple 1, Sudhir M. Kharad 2 Abstract This paper presents the design of the technique using fuzzy inference system for
More informationAN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS
Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH
More informationAdaptive Wavelet Image Denoising Based on the Entropy of Homogenus Regions
International Journal of Electrical and Electronic Science 206; 3(4): 9-25 http://www.aascit.org/journal/ijees ISSN: 2375-2998 Adaptive Wavelet Image Denoising Based on the Entropy of Homogenus Regions
More informationMotivation. Gray Levels
Motivation Image Intensity and Point Operations Dr. Edmund Lam Department of Electrical and Electronic Engineering The University of Hong ong A digital image is a matrix of numbers, each corresponding
More informationRenu Dhir C.S.E department NIT Jalandhar India
Volume 2, Issue 5, May 202 ISSN: 2277 28X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: Novel Edge Detection Using Adaptive
More informationGENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY
Volume 1, No. 5, December 2010 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info GENETIC ALGORITHM BASED SUBSTITUTION TECHNIQUE OF IMAGE STEGANOGRAPHY Samir
More information