Appendix A. Definition of Terms

Size: px
Start display at page:

Download "Appendix A. Definition of Terms"

Transcription

1 Appendix A Definition of Terms Artifact: Artifacts are the irregularities that may be present in an image after processing. They are not related to the details of the image and sometimes accompany transmitted signals. Bit-plane: The bit-plane of an image is a set of bits corresponding to a given bit position in each of the binary numbers representing the image. Carrier: Carriers are the digital media that are used as a medium to carry the secret data. It is the medium into which the secret data is hidden. Ciphertext: It is the translated text which is formed by encrypting the secret data. It is the unordered or substituted text created by changing its readability and meaning. Coefficient: Coefficients are formed when a signal is transformed a from an image representation into a frequency representation by using discrete transformation. Cover-image: The image which is taken as a medium of covering the secret data. It is the original image into which the secret data is inserted into its redundant bits. Cryptanalysis: It is the study of attacks on the cryptography to find weaknesses in them, without necessarily knowing the key or the algorithm. Decibel: The decibel (db) is a logarithmic unit used to express the ratio between two values of a physical quantity. It is used to measure signal level after processing and is widely used in electronics, signals and communication. Decryption: Decryption is the process of taking encoded or encrypted text and converting it back into original plaintext which are understandable. Eavesdropper: Eavesdroppers are the attackers (unauthorized person) who try to break a signal through communication channel to check if the signal contains any secret data. 183

2 Appendix A Encryption: The process of transformation from plaintext (secret message) to ciphertext (unreadable format) to create a data that is not understandable. Entropy coding: Entropy coding encodes an image by rounding the coefficient values to integer to reduce the size. Entropy coding is lossless compression. Fidelity: Fidelity is the perceptual similarity between images before and after processing. Keystream generator: It generates random sequence of numbers by partitioning the stego-key into random sequences. These sequences allocate positions of the secret bits. MSE: Mean squared error (MSE) shows variation between the cover- image and resultant (stego) image. A high quality image should have less MSE value. Payload: In steganography, payload relates to the amount of secret data that can be hidden into digital media. Pixel indices: Pixel indices are the random locations of the pixels which are formed using random number generator. Plaintext: It is the original secret message that is transformed into unordered state using encryption process. PRNG: The pseudorandom number generator (PRNG) generates sequence of random numbers using a stego-key which is used to select random pixels of the coverimage for hiding the secret data. The key is used as seed for the random number generation. PSNR: The Peak-Signal-to-Noise Ratio (PSNR) is the performance measurement criteria that show the relationship between the bit- or detection-error of two similar signals. A high quality image should have higher PSNR value. Randomization: It is the process of scattering the secret bits in different pixel position of the cover-image that makes the secret data to be in random order. Seed: The seed defines the starting point of a random number generator. It initiates the process of random number generation. 184

3 Appendix A Steganalysis: Steganalysis is the technique to detect whether a given digital media contains hidden data. The steganalysis plays a role in the selection of features or properties of the digital media to test for suspicious data. Steganalyst: Steganalyst is the individual (attacker) who performs the steganalysis with the purpose of detecting suspicious or secret data into a medium when transmitted. Stego-image: The resultant image formed as a result of the steganography algorithm which contains secret data embedded into it. Stego-key: The secret key used in the steganographic method to choose the random pixel position in the image. The security of a stego-key Target character: It is the last character that is embedded into the cover-image. The target character terminates the embedding and extraction process. Zigzag: Zigzag order is performed to group similar frequencies together by sorting the coefficients in zigzag ordering. 185

4 Appendix B List of Publications Journals 1. Laskar, S.A. and Hemachandran, K. (2012). An Analysis of Steganography and Steganalysis Techniques, Assam University Journal of Science and Technology, ISSN: , Vol. 9, No. 2, pp Laskar, S.A. and Hemachandran, K. (2012). High Capacity data hiding using LSB Steganography and Encryption. International Journal of Database Management Systems (IJDMS), ISSN: , Vol. 4, No. 6, pp Laskar, S.A. and Hemachandran, K. (2013). Steganography Based on Random Pixel Selection for Efficient Data Hiding. International journal of Computer Engineering and Technology (IJCET), ISSN: , Vol. 4, Issue 2, pp Laskar, S.A. and Hemachandran, K. (2014). A Review on Image Steganalysis techniques for attacking Steganography, International Journal of Engineering Research & Technology (IJERT), ISSN: , Vol. 3, Issue 1, pp Book Chapters 1. Laskar, S.A. and Hemachandran, K. Combining JPEG Steganography and Substitution Encryption for Secure Data Communication. In David C. Wyld, et al. (Eds). Computer Science & Information Technology (CS & IT): ISSN: , CCSEA, SEA, CLOUD, DKMP, CS & IT 05, pp , (2012). 186

5 Appendix B Conference and Symposium 1. Laskar, S.A. and Hemachandran, K. Combining JPEG Steganography and Substitution Encryption for Secure Data Communication has been presented in Second International Conference on Computer Science, Engineering and Applications (CCSEA)-2012, CCSEA, SEA, CLOUD, DKMP, CS & IT 5, Organized by AIRCC, May, 26-27, 2012, Delhi, India. Citation Count - (a) Laskar, S.A. and Hemachandran, K. (2012). An Analysis of Steganography and Steganalysis Techniques, Assam University Journal of Science and Technology, ISSN: , Vol.9, No-2, pp Cited by 1 Cited by 1. Maan, V. K. and Dhaliwal, H. S. (2013). Vector Quantization in Image Steganography. International Journal of Engineering Research & Technology (IJERT) Vol. 2, No. 4 (2013), pp (b) Laskar, S.A. and Hemachandran, K. (2012). High Capacity data hiding using LSB Steganography and Encryption." International Journal of Database Management Systems (IJDMS), ISSN: , Vol.4, No. 6, pp , DOI: /ijdms Cited by 5 Cited by 1. Bansal, T. and Lamba, R. (2013). Steganography on Colour Images using 32x32 Quantization Table. International Journal for Advance Research in Engineering and Technology (IJARET), Volume 1, Issue V, 2013, pp , ISSN: Vasudev, P. and Saurabh, K. (2013). Video Steganography Based on Improved DCT 32*32 Vector Quantization Method. International Journal of Software & Hardware Research in Engineering (IJSHRE), ISSN: , Vol. 1, No. 4, 2013, pp

6 Appendix B 3. Garg, T. and Vatta, S. (2014). A Review on Data Compression using Steganography. International Journal of Computer Science and Mobile Computing (IJCSMC), Vol.3 Issue.6, June- 2014, pg , ISSN X. (c) Laskar, S.A. and Hemachandran, K. (2013). Steganography Based On Random Pixel Selection for Efficient Data Hiding, International journal of Computer Engineering and Technology (IJCET), ISSN , Vol. 4, Issue 2, pp Cited by 4 Cited by 1. Qasim, M. A. and Pawar, D. (2013). Encryption & Steganography in IPv6 source address International Journal of Computer Engineering & Technology (IJCET), ISSN: , Vol.4, No. 2 (2013) pp Sumathi, C. P.; Santanam, T. and Umamaheswari, G. (2013). A Study of Various Steganographic Techniques Used for Information Hiding." International Journal of Computer Science & Engineering Survey (IJCSES), ISSN: , Vol.4, no. 6 (2013), pp Abdulhameed, Z. N. and Mahmood, M. K. (2014). High Capacity Steganography Based on Chaos and Contourlet Transform for Hiding Multimedia Data. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN: , Volume 5, Issue 1, (2014), pp Mala, R. and Manimozi, I. A Novel Approach for Reversible Data Hiding in Encrypted Images Using Key Based Pixel Selection. International Journal of Computer Science & Engineering Technology (IJCSET), ISSN: , Vol. 5 No. 06 Jun 2014, pp

7 Appendix C Participation in Conferences and Workshops 1. National conference on Current Trends in computer Science (CTCS 2010), Department of Computer Science, Assam University, Silchar 22-24, February 2010, AUS. 2. ISI-AU Workshop On Intelligent Data Analysis: Theory and Application, 1-5, March 2011, Computer Vision and Pattern Recognition Unit, Indian Statistucal Institute, Kolkata and Department of Information Technology, Assam University, Silchar, India. 3. ISI-NEHU Winter School on Soft Computing, Pattern Recognition and Image Processing, October 20 24, 2011, Department of Information Technology, North- Eastern Hill University, Shillong, Meghalaya. 4. Workshop on Application of Mathematics in Computer Science and Engineering, August 2-4, 2011, Department of Mathematics, NIT, Silchar, India. 5. International Conference on Computer Science, Engineering and Applications, Organized by AIRCC, May, 26-27, 2012, New Delhi, India th Workshop on Computational Information Processing, December 3-7, 2012, Electronics and Communication Sciences Unit, ISI Kolkata and Department of Information Technology, Assam University, Silchar, India. 7. Workshop on Role of IPR in Electronics, Communication, Computing and Devices, November 27-28, 2013, Tezpur University IPR Cell and Institute of Engineers, Silchar, India. 189

CHAPTER 8. Conclusions and Future Work

CHAPTER 8. Conclusions and Future Work CHAPTER 8 Conclusions and Future Work The growth of modern communication needs a special means of security especially on computer network. As there appears a risk that the sensitive information transmitted

More information

Digital Image Steganography Techniques: Case Study. Karnataka, India.

Digital Image Steganography Techniques: Case Study. Karnataka, India. ISSN: 2320 8791 (Impact Factor: 1.479) Digital Image Steganography Techniques: Case Study Santosh Kumar.S 1, Archana.M 2 1 Department of Electronicsand Communication Engineering, Sri Venkateshwara College

More information

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function

Bit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,

More information

A New Approach to Compressed Image Steganography Using Wavelet Transform

A New Approach to Compressed Image Steganography Using Wavelet Transform IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 5, Ver. III (Sep. Oct. 2015), PP 53-59 www.iosrjournals.org A New Approach to Compressed Image Steganography

More information

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS

VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS VARIABLE RATE STEGANOGRAPHY IN DIGITAL IMAGES USING TWO, THREE AND FOUR NEIGHBOR PIXELS Anita Pradhan Department of CSE, Sri Sivani College of Engineering, Srikakulam, Andhra Pradesh, India anita.pradhan15@gmail.com

More information

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction

Abstract. Keywords: Genetic Algorithm, Mean Square Error, Peak Signal to noise Ratio, Image fidelity. 1. Introduction A Report on Genetic Algorithm based Steganography for Image Authentication by Amrita Khamrui Enrolled Scholar Department of Computer Science & Engineering, Kalyani University Prof. (Dr.) J K Mandal Professor

More information

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography

Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Text Hiding In Multimedia By Huffman Encoding Algorithm Using Steganography Madhavi V.Kale 1, Prof. Swati A.Patil 2 PG Student, Dept. Of CSE., G.H.Raisoni Institute Of Engineering And Management,Jalgaon

More information

Efficient & Secure Data Hiding Using Secret Reference Matrix

Efficient & Secure Data Hiding Using Secret Reference Matrix Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade 1, Rajshree Mahajan 2, Chandan Kulthe 3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3

More information

Random Image Embedded in Videos using LSB Insertion Algorithm

Random Image Embedded in Videos using LSB Insertion Algorithm Random Image Embedded in Videos using LSB Insertion Algorithm K.Parvathi Divya 1, K.Mahesh 2 Research Scholar 1, * Associate Professor 2 Department of Computer Science and Engg, Alagappa university, Karaikudi.

More information

Digital Image Steganography Using Bit Flipping

Digital Image Steganography Using Bit Flipping BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 1 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0006 Digital Image Steganography Using

More information

Steganography. Brent McClain Rob Carey

Steganography. Brent McClain Rob Carey Steganography Brent McClain Rob Carey What is Steganography Greek Origin Steganos means covered Graph means writing Hiding information in plain sight Cover Image Another image hidden in the picture Created

More information

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction

CHAPTER 6. LSB based data hiding with double Encryption. 6.1 Introduction CHAPTER 6 LSB based data hiding with double Encryption 6.1 Introduction In image steganography, the amount of secret data that can be embedded depends on the method and the cover-image as capacity limitation

More information

Application of Data Hiding in Audio-Video Using Advance Algorithm

Application of Data Hiding in Audio-Video Using Advance Algorithm Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

LSB Based Audio Steganography Using Pattern Matching

LSB Based Audio Steganography Using Pattern Matching ISSN: 359-0040 Vol 2 Issue, November - 205 LSB Based Audio Steganography Using Pattern Matching Mr Ratul Choudhury Student, Dept of Computer Sc & Engg Dept University of Calcutta Kolkata, India ratulchowdhury@iemcalcom

More information

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM

Keywords Stegnography, stego-image, Diamond Encoding, DCT,stego-frame and stego video. BLOCK DIAGRAM Volume 6, Issue 1, January 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Information

More information

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION

STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,

More information

A Reversible Data Hiding Scheme for BTC- Compressed Images

A Reversible Data Hiding Scheme for BTC- Compressed Images IJACSA International Journal of Advanced Computer Science and Applications, A Reversible Data Hiding Scheme for BTC- Compressed Images Ching-Chiuan Lin Shih-Chieh Chen Department of Multimedia and Game

More information

Adaptive Pixel Pair Matching Technique for Data Embedding

Adaptive Pixel Pair Matching Technique for Data Embedding Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Enhancing the Image Compression Rate Using Steganography

Enhancing the Image Compression Rate Using Steganography The International Journal Of Engineering And Science (IJES) Volume 3 Issue 2 Pages 16-21 2014 ISSN(e): 2319 1813 ISSN(p): 2319 1805 Enhancing the Image Compression Rate Using Steganography 1, Archana Parkhe,

More information

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation , 2009, 5, 363-370 doi:10.4236/ijcns.2009.25040 Published Online August 2009 (http://www.scirp.org/journal/ijcns/). Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation

More information

A Secure Steganography Technique using DCT and Modified RC4

A Secure Steganography Technique using DCT and Modified RC4 International Journal of Interdisciplinary and Multidisciplinary Studies (IJIMS), 2015, Vol 2, No.6, 61-65. 61 Available online at http://www.ijims.com ISSN: 2348 0343 A Secure Steganography Technique

More information

Improved Qualitative Color Image Steganography Based on DWT

Improved Qualitative Color Image Steganography Based on DWT Improved Qualitative Color Image Steganography Based on DWT 1 Naresh Goud M, II Arjun Nelikanti I, II M. Tech student I, II Dept. of CSE, I, II Vardhaman College of Eng. Hyderabad, India Muni Sekhar V

More information

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS

AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS AN EFFICIENT VIDEO WATERMARKING USING COLOR HISTOGRAM ANALYSIS AND BITPLANE IMAGE ARRAYS G Prakash 1,TVS Gowtham Prasad 2, T.Ravi Kumar Naidu 3 1MTech(DECS) student, Department of ECE, sree vidyanikethan

More information

Implementation of Random Byte Hiding algorithm in Video Steganography

Implementation of Random Byte Hiding algorithm in Video Steganography Implementation of Random Byte Hiding algorithm in Video Steganography S.Aswath 1, K.Akshara 2, P.Pavithra 2, D.S.Abinaya 2 Asssisant Professor 1, Student 2 (IV Year) Department of Electronics and Communication

More information

Data Hiding in Color Images Using Modified Quantization Table

Data Hiding in Color Images Using Modified Quantization Table Data Hiding in Color Images Using Modified Quantization Table Neha Batra 1 Pooja Kaushik 2 1 Pursuing M.Tech, Dept., of ECE, MMU, Mullana, India 2 Assistant Professor, Dept., of ECE, MMU, Mullana, India

More information

Architectural Design of Multi Level Steganography System for Data Transmission

Architectural Design of Multi Level Steganography System for Data Transmission Architectural Design of Multi Level Steganography System for Data Transmission Adedayo Adeolu Adeniji, Micheal Esiefarienrhe, and Naison Gasale Abstract Recent advances in steganography systems have shown

More information

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi

OTP-Steg. One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi OTP-Steg One-Time Pad Image Steganography Using OTP-Steg V.1.0 Software October 2015 Dr. Michael J. Pelosi What is Steganography? Steganography literally means covered writing Encompasses methods of transmitting

More information

Robust DWT Based Technique for Digital Watermarking

Robust DWT Based Technique for Digital Watermarking Robust DWT Based Technique for Digital Watermarking Mamta Jain Department of Electronics & Communication Institute of Engineering & Technology Alwar er.mamtajain@gmail.com Abstract Hiding the information

More information

ITERATIVE HAAR-DWT BASED EFFICIENT IMAGE STEGANOGRAPHY

ITERATIVE HAAR-DWT BASED EFFICIENT IMAGE STEGANOGRAPHY ITERATIVE HAAR-DWT BASED EFFICIENT IMAGE STEGANOGRAPHY Aditi Singh *1, K S Venkatesh 2 and Vikas Patidar 3 Department of Electrical Engineering, Indian Institute of Technology Kanpur, Kanpur-208016, Uttar

More information

Breaking the OutGuess

Breaking the OutGuess Breaking the OutGuess Jessica Fridrich, Miroslav Goljan, Dorin Hogea * presented by Deepa Kundur Department of Electrical and Computer Engineering * Department of Computer Science SUNY Binghamton, Binghamton,

More information

Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation

Partial Video Encryption Using Random Permutation Based on Modification on Dct Based Transformation International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 2, Issue 6 (June 2013), PP. 54-58 Partial Video Encryption Using Random Permutation Based

More information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information

A Revisit to LSB Substitution Based Data Hiding for Embedding More Information A Revisit to LSB Substitution Based Data Hiding for Embedding More Information Yanjun Liu 1,, Chin-Chen Chang 1, and Tzu-Yi Chien 2 1 Department of Information Engineering and Computer Science, Feng Chia

More information

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography

A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography A Comparative Study and Analysis of Quantization Table Modification Effect on JPEG Based Image Steganography V. Senthooran 1, L. Ranathunga 2, KokSheik Wong 3 1,2 Department of Information Technology,

More information

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature

Research Article A Novel Steganalytic Algorithm based on III Level DWT with Energy as Feature Research Journal of Applied Sciences, Engineering and Technology 7(19): 4100-4105, 2014 DOI:10.19026/rjaset.7.773 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitted:

More information

Image Steganography Method Using Integer Wavelet Transform

Image Steganography Method Using Integer Wavelet Transform ISSN (Online) : 2319-8753 ISSN (Print) : 2347-6710 International Journal of Innovative Research in Science, Engineering and Technology Volume 3, Special Issue 3, March 2014 2014 International Conference

More information

Comparison of Wavelet Based Watermarking Techniques for Various Attacks

Comparison of Wavelet Based Watermarking Techniques for Various Attacks International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-3, Issue-4, April 2015 Comparison of Wavelet Based Watermarking Techniques for Various Attacks Sachin B. Patel,

More information

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach

A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach www.ijcsi.org 402 A Detailed look of Audio Steganography Techniques using LSB and Genetic Algorithm Approach Gunjan Nehru 1, Puja Dhar 2 1 Department of Information Technology, IEC-Group of Institutions

More information

IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG

IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG IMAGE COMPRESSION USING HYBRID QUANTIZATION METHOD IN JPEG MANGESH JADHAV a, SNEHA GHANEKAR b, JIGAR JAIN c a 13/A Krishi Housing Society, Gokhale Nagar, Pune 411016,Maharashtra, India. (mail2mangeshjadhav@gmail.com)

More information

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method

Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting Method www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 8 August, 2014 Page No. 7932-7937 Highly Secure Invertible Data Embedding Scheme Using Histogram Shifting

More information

A Novel Method for Compressing Encrypted Images using Auxiliary Information

A Novel Method for Compressing Encrypted Images using Auxiliary Information , October 19-21, 2016, San Francisco, USA A Novel Method for Compressing Encrypted Images using Auxiliary Information Sundaraiah Pakam, Chandra Mohan Reddy Sivappagar Member, IAENG Abstract This paper

More information

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2]

A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2] RESEARCH ARTICLE A Review: A Digital Image Steganography Mrs.M.A.Wakure [1], Mrs.S.A.Wakure [2] Department of Computer Science & Engineering [1] Dr. BAMU University, Osmanabad Department of Electronics

More information

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm

Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Data Embedding Method Using Adaptive Pixel Pair Matching Algorithm Mr. K. Nandha Kumar 1, Mr. R. Anandan 2 1PG Scholar, Department of Electronics and Communication Engineering, Gojan School of Business

More information

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission

Image Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.194

More information

Jeff Hinson CS525, Spring 2010

Jeff Hinson CS525, Spring 2010 DIGITAL WATERMARKING Jeff Hinson CS525, Spring 2010 Outline Introduction Challenges Algorithms / Methods Detection Existing Programs Lessons Learned / Conclusion Questions Jeff Hinson CS525 Slide #1 Introduction

More information

AN APPROACH FOR COLOR IMAGE COMPRESSION OF BMP AND TIFF IMAGES USING DCT AND DWT

AN APPROACH FOR COLOR IMAGE COMPRESSION OF BMP AND TIFF IMAGES USING DCT AND DWT INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 6367(Print) ISSN 0976 6375(Online)

More information

Robust Steganography Using Texture Synthesis

Robust Steganography Using Texture Synthesis Robust Steganography Using Texture Synthesis Zhenxing Qian 1, Hang Zhou 2, Weiming Zhang 2, Xinpeng Zhang 1 1. School of Communication and Information Engineering, Shanghai University, Shanghai, 200444,

More information

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography

Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Least Significant Bit (LSB) and Discrete Cosine Transform (DCT) based Steganography Smruti Ranjan Gouda (Dept. Of computer Science & Engineering, Asst. Professor, Gandhi Group of institutions, Berhampur,

More information

International Journal of Computer Engineering and Applications,

International Journal of Computer Engineering and Applications, International Journal of Computer Engineering and Applications, Volume XII, Issue I, Jan. 18, www.ijcea.com ISSN 2321-3469 SECURING TEXT DATA BY HIDING IN AN IMAGE USING AES CRYPTOGRAPHY AND LSB STEGANOGRAPHY

More information

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography

A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography A Secure Image Communication Scheme based on combination of Compression, Cryptography and Steganography Bhavya Ahuja 1, S. K. Muttoo 2, Deepika Aggarwal 3 ABSTRACT In this paper we propose a new technique

More information

Efficient Image Steganography Using Integer Wavelet Transform

Efficient Image Steganography Using Integer Wavelet Transform Efficient Image Steganography Using Integer Wavelet Transform DHIVYA DHARSHINI. K 1, Dr. K. ANUSDHA 2 1 M.Tech, Department of Electronics Engineering, Pondicherry University, Puducherry, India. 2 Assistant

More information

A SECURED LSB IMAGE STEGANOGRAPHY SYSTEM USING EDGE DETECTION, LZW COMPRESSION AND HYBRID ENCRYPTION METHODS

A SECURED LSB IMAGE STEGANOGRAPHY SYSTEM USING EDGE DETECTION, LZW COMPRESSION AND HYBRID ENCRYPTION METHODS A SECURED LSB IMAGE STEGANOGRAPHY SYSTEM USING EDGE DETECTION, LZW COMPRESSION AND HYBRID ENCRYPTION METHODS S. N. Rekha 1, Y. Manjula 2, M.Z. Kurian 3 1 PG Student (DE), 2 Assistant Professor, 3 HOD,

More information

Face Protection by Fast Selective Encryption in a Video

Face Protection by Fast Selective Encryption in a Video Face Protection by Fast Selective Encryption in a Video J. M. Rodrigues, W. Puech, P. Meuel, J.C. Bajard and M. Chaumont LIRMM Laboratory, UMR CNRS 5506, University of Montpellier II 161, rue Ada, 34392

More information

ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images

ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images ACEAIT-3055 High-Capacity Steganography Using MRF-Synthesized Cover Images Chaur-Chin Chen and Wei-Ju Lai Department of Computer Science National Tsing Hua University Hsinchu 30013, Taiwan e-mail: cchen@cs.nthu.edu.tw

More information

Steganography by using Logistic Map Function and Cellular Automata

Steganography by using Logistic Map Function and Cellular Automata Research Journal of Applied Sciences Engineering and Technology 4(3): 4991-4995 01 ISSN: 040-7467 Maxwell Scientific Organization 01 Submitted: February 0 01 Accepted: April 30 01 Published: December 01

More information

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES

SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES VOL., NO. 7, APRIL 5 ISSN 89-668 6-5 Asian Research Publishing Network (ARPN). All rights reserved. SECURE DATA EMBEDDING USING REVERSIBLE DATA HIDING FOR ENCRYPTED IMAGES R. Selveeswari and P. R. Vijayalakshmi

More information

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm

Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm Pixel Steganalysis A Novel Approach in Image Steganography Using F5 Algorithm Prabhu Kumar 1,, Nikhil Tirpathi, 2, G.Michael 3 UG Student, Dept. of CSE, Bharath University, Chennai, India 1,2 Assistant

More information

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program

Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12086-12090 Hybrid Stegnography using ImagesVaried PVD+ LSB Detection Program Shruti

More information

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM

CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM 74 CHAPTER 4 REVERSIBLE IMAGE WATERMARKING USING BIT PLANE CODING AND LIFTING WAVELET TRANSFORM Many data embedding methods use procedures that in which the original image is distorted by quite a small

More information

A Survey on Digital Image Steganography and Steganalysis

A Survey on Digital Image Steganography and Steganalysis IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 8, Issue 1 (Sep. - Oct. 2013), PP 56-60 A Survey on Digital Image Steganography and Steganalysis

More information

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE

FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE FPGA IMPLEMENTATION OF INVISIBLE VIDEO WATERMARKING USING DWT TECHNIQUE S.Sivasankari, Arasu Engineering College, Kumbakonam-612001 Sivasankari2324@gmail.com Abstract: Watermarking is a science of hiding

More information

A Review of Approaches for Steganography

A Review of Approaches for Steganography International Journal of Computer Science and Engineering Open Access Review Paper Volume-2, Issue-5 E-ISSN: 2347-2693 A Review of Approaches for Steganography Komal Arora 1* and Geetanjali Gandhi 2 1*,2

More information

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review

Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Journal Science ISSN: 39-7157, ISSN: 39-7157, 1 015 015 Audio Contents Protection using Invisible Frequency Band Hiding Based on Mel Feature Space Detection: A Review Shefali Rani1, Yogesh Kumar 1 (M.Tech

More information

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING

SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE PROCESSING International Journal of Engineering Research ISSN: 2348-4039 & Management Technology May-2017 Volume- 4, Issue-3 Email: editor@ijermt.org www.ijermt.org SECRETLY CONCEALING MESSAGE USING ADVANCED IMAGE

More information

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing

A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing A Robust Image Watermarking Technique Using Luminance Based Area Selection and Block Pixel Value Differencing Jasvinder Singh 1, Mehak Aggarwal 2, Kulbhushan Singla 3 1Student M.Tech Dept. of Computer

More information

Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm

Image Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm Steganography Using Discrete Cosine Transform (DCT) and Blowfish Algorithm Monika Gunjal #1, Jasmine Jha *2 # M.E, CE Dept, L.J.Engg College, India * M.E, I.T.Dept, L.J.EnggCollege,India Abstract - Steganography

More information

Metamorphosis of High Capacity Steganography Schemes

Metamorphosis of High Capacity Steganography Schemes 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Metamorphosis of High Capacity Steganography Schemes 1 Shami

More information

A Digital Video Watermarking Algorithm Based on LSB and DCT

A Digital Video Watermarking Algorithm Based on LSB and DCT A Digital Video Watermarking Algorithm Based on LSB and DCT Kirti Jain, U.S.N Raju Department of Computer Science and Engineering NIT Warangal India kirtijain.kj@gmail.com,usnraju@gmail.com ABSTRACT: In

More information

A Study on Different JPEG Steganograhic Schemes

A Study on Different JPEG Steganograhic Schemes A Study on Different JPEG Steganograhic Schemes Alphy Ros Mathew, Sreekumar K Department of Computer Science, College of Engineering,Ponjar, Cochin University of Science And Technology Kottayam,Kerala,India

More information

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS

AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS AN ANALYSIS OF VARIOUS STEGANOGRAPHIC ALGORITHMS Chinchu Elza Andrews 1, Iwin Thanakumar Joseph 2 1. Post Graduate Student, Department of Computer Science and Engineering, Karunya University, India 2.

More information

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB

Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Random Traversing Based Reversible Data Hiding Technique Using PE and LSB Rhythm Katira #1, Prof. V. Thanikaiselvan *2 # ECE Department, VIT University Vellore, Tamil-Nadu, India 1 rhythm.katira2009@vit.ac.in

More information

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS

EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS EMPIRICAL ANALYSIS ON STEGANOGRAPHY USING JSTEG, OUTGUESS 0.1 AND F5 ALGORITHMS Dr. N.MANOHARAN 1 Dr.R.BALASUBRAMANIAN 2 S.UMA NANDHINI 3 V.SUJATHA 4 1 Assistant Professor in Department of Computer Science,

More information

A Framework to Reversible Data Hiding Using Histogram-Modification

A Framework to Reversible Data Hiding Using Histogram-Modification A Framework to Reversible Data Hiding Using Histogram-Modification R. Neeraja 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:r.p.neeru@gmail.com M. Gnana Priya

More information

A Survey on Edge Detection Techniques using Different Types of Digital Images

A Survey on Edge Detection Techniques using Different Types of Digital Images Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.694

More information

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm

A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data Encryption Standard Algorithm American Journal of Applied Sciences 9 (5): 766-771, 2012 ISSN 1546-9239 2012 Science Publications A Hybrid Approach for Detecting Stego Content in Corporate Mail Using Neural Network Based Simplified-Data

More information

Text Steganography Using Compression and Random Number Generators

Text Steganography Using Compression and Random Number Generators Text Steganography Using Compression and Random Number Generators Mohamed Y Elmahi Elimam Almahdi University Kosti, Sudan Talaat M.wahbi Sudan University of Science and Technology Khartoum, Sudan Mohamed

More information

Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform

Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform Wafaa Mustafa Abduallah 1, Abdul Monem S. Rahma 2, and Al-Sakib Khan Pathan 1 1 Department of Computer Science,

More information

LITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network Jasmeet Kaur 1, Nitika Kapoor 2, Harish Kundra 3

LITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network Jasmeet Kaur 1, Nitika Kapoor 2, Harish Kundra 3 LITERATURE SURVEY: Steganography Using Redundant Bit Replacement By Neural Network Jasmeet Kaur 1, Nitika Kapoor 2, Harish Kundra 3 1 Research Scholar, 2,3 Assistant Professor 1,2,3 Department of Computer

More information

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack

Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack 2010 Fourth Asia International Conference on Mathematical/Analytical Modelling and Computer Simulation Enhanced Least Significant Bit Scheme Robust Against Chi-Squared Attack Masoud Afrakhteh Dept. of

More information

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques

Secured Double Layer Data Hiding Using Encryption and Decryption Techniques Secured Double Layer Data Hiding Using Encryption and Decryption Techniques H.MaheshKumar M.Vignesh Abstract In this period of Internet every digitized object is transferable and exchangeable over internet

More information

Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique

Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique Improving Blind Image Steganalysis using Genetic Algorithm and Fusion Technique Sarita R. Visavalia 1, Dr. Amit Ganatra 2 1 Department of Information Technology, CHARUSAT, India 2 Dpartmentof Computer

More information

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY

IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY IMPROVING THE RELIABILITY OF DETECTION OF LSB REPLACEMENT STEGANOGRAPHY Shreelekshmi R, Wilscy M 2 and C E Veni Madhavan 3 Department of Computer Science & Engineering, College of Engineering, Trivandrum,

More information

A Novel Information Security Scheme using Cryptic Steganography

A Novel Information Security Scheme using Cryptic Steganography A Novel Information Security Scheme using Cryptic Steganography B.RAJA RAO Associate Professor, E.C.E Dept raja_rao_b@ yahoo.com P.ANIL KUMAR Assistant Professor, I.T Dept anilkumar_pallikonda@yahoo.co.in

More information

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography

A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography A Novel Approach for Hiding Encrypted Data in Image, Audio and Video using Steganography V. Lokeswara Reddy Associate Professor, Department of CSE, K.S.R.M. College of Engg., Kadapa, Y.S.R. Dist., A.P.(INDIA)

More information

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE

SECURITY ENHANCEMENT: STEGANO-CRYPTO USING CHOAS BASED Sblock EMBEDDING TECHNIQUE Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 8, August 2015,

More information

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image

Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image 015 International Conference on Computer, Control, Informatics and Its Applications Chaos-based Modified EzStego Algorithm for Improving Security of Message Hiding in GIF Image Rinaldi Munir Informatics

More information

EFFECTIVE USE OF STEGANOGRAPHY ON AUDIO WAVE AND SPY ANALYSIS

EFFECTIVE USE OF STEGANOGRAPHY ON AUDIO WAVE AND SPY ANALYSIS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 4, July-August 2016, pp. 32 39, Article ID: IJECET_07_04_004 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=4

More information

New Steganography Technique with Symmetric Cryptography

New Steganography Technique with Symmetric Cryptography 17 New Steganography Technique with Symmetric Cryptography Swati Gupta, PG Student, Department of CSE, SSSITS, Sehore, India Gajendra Singh, Head, Department of CSE &IT, SSSITS, Sehore, India Ravindra

More information

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Research Article Improvements in Geometry-Based Secret Image Sharing Approach with Steganography Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 2009, Article ID 187874, 11 pages doi:10.1155/2009/187874 Research Article Improvements in Geometry-Based Secret Image Sharing

More information

Reversible Data Hiding in Colour Images using AES Data Encryption System

Reversible Data Hiding in Colour Images using AES Data Encryption System Reversible Data Hiding in Colour Images using AES Data Encryption System M. Prem Anand 1, Y. Karthikeyan 2 1 Assistant Professor 2 M.E Student 1,2 Department of Electronics & Communication Engineering,

More information

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)

SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) Ayman Wazwaz 1, Khalil Abu-haltam 2, Sawan Atawneh 2, Areej Idaes 2, Dalal Salem 2 1 Electrical Engineering Department, Palestine Polytechnic

More information

Image Steganography Technique By Using Braille Method of Blind People (LSBraille)

Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Image Steganography Technique By Using Braille Method of Blind People (LSBraille) Abdelmgeid Amin Ali Associate Professor, Dept. of Computer Science Faculty of Science, Al Minia University Al Minia, Egypt

More information

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of

More information

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS

DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS DIGITAL IMAGE WATERMARKING BASED ON A RELATION BETWEEN SPATIAL AND FREQUENCY DOMAINS Murat Furat Mustafa Oral e-mail: mfurat@cu.edu.tr e-mail: moral@mku.edu.tr Cukurova University, Faculty of Engineering,

More information

University of Mustansiriyah, Baghdad, Iraq

University of Mustansiriyah, Baghdad, Iraq Volume 5, Issue 9, September 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Audio Compression

More information

Webpage: Volume 4, Issue V, May 2016 ISSN

Webpage:   Volume 4, Issue V, May 2016 ISSN EMBEDDING & EXTRACTION OF POWER DATA INTO A AUDIO FILE USING MODIFIED DIRECT SEQUENCE SPREAD SPECTRUM TECHNIQUE Vijeta Pandey 1, Vikas Verma 2, Gourav Sharma 3 1,M.Tech Student, Electrical Engineering

More information

Secured Watermarking in DCT Domain using CRT and Complexity Analysis

Secured Watermarking in DCT Domain using CRT and Complexity Analysis Secured Watermarking in DCT Domain using CRT and Complexity Analysis Varun Kumar Department of Electronics & Communication Engg Om Institute of Technology and Management, HISAR-125001, INDIA Kuldeep Bhardwaj

More information

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption

GA Based Reversible Data Hiding in Encrypted Images by Reserving Room before Encryption GA Based Reversible Hiding in Encrypted s by Reserving Room before Encryption Patil K.U. 1 &Nandwalkar B.R. 2 1,2 (Comp. Engg. Dept., GNS COENashik, SPP Univ., Pune(MS), India) Abstract Information Security

More information

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution

A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Volume 6, Issue 8, August 2017, ISSN: 2278 1323 A Secure Steganographic Method Using Modified LSB (Least Significant Bit) Substitution Suman, Dr. Sukhjeet Kaur Ranade Abstract In this paper a technique

More information

Secret Image Sharing Scheme Based on a Boolean Operation

Secret Image Sharing Scheme Based on a Boolean Operation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 14, No 2 Sofia 2014 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2014-0023 Secret Image Sharing Scheme Based

More information