Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
This document provides an exploratory review of soft computing techniques for image segmentation. It discusses various segmentation techniques including discontinuity-based techniques like point, line and edge detection using spatial filtering. Thresholding techniques like global, adaptive and multi-level thresholding are also covered. Region-based techniques such as region growing, region splitting/merging and morphological watersheds are summarized. The document concludes that future work can focus on developing genetic segmentation filters using a genetic algorithm approach for medical image segmentation.
This document discusses data hiding techniques for images. It begins by introducing steganography and some common image steganography methods like LSB substitution, blocking, and palette modification. It then reviews related work on minimizing distortion in steganography, modifying matrix encoding for minimal distortion, and designing adaptive steganographic schemes. The document proposes using a universal distortion measure to evaluate embedding changes independently of the domain. It presents a system for reversible data hiding in encrypted images that partitions the image, encrypts it, hides data in the encrypted image, and allows extraction from the decrypted or encrypted image. Least significant bit substitution is discussed as an approach for hiding data in the encrypted image.
This document presents a method for image upscaling using a fuzzy ARTMAP neural network. It begins with an introduction to image upscaling and interpolation techniques. It then provides background on ARTMAP neural networks and fuzzy logic. The proposed method uses a linear interpolation algorithm trained with an ARTMAP network. Results show the method performs better than nearest neighbor interpolation in terms of peak signal-to-noise ratio, mean squared error, and structural similarity, though not as high as bicubic interpolation. Overall, the fuzzy ARTMAP network provides an effective way to perform image upscaling with fewer artifacts than traditional methods.
Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
A Secure Color Image Steganography in Transform Domain ijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
This document summarizes an article that proposes a new image steganography technique using discrete wavelet transform. The technique applies an adaptive pixel pair matching method from the spatial domain to the frequency domain. Data is embedded in the middle frequencies of the discrete wavelet transformed image because they are more robust to attacks than high frequencies. The coefficients in the low frequency sub-band are preserved unchanged to improve image quality. The experimental results showed better performance with discrete wavelet transform compared to the spatial domain.
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET Journal
This document presents a hybrid steganography technique that embeds a secret image into a cover image using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The cover image is decomposed using DWT and its high frequency components are replaced with the secret image, which is first decomposed using SVD and DCT. Experimental results show correlation coefficients above 0.999 when extracting the secret image, indicating high quality extraction. The technique provides improved steganography by embedding the secret image in the visually insensitive high frequency components of the cover image.
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as scaling up to the original image occurs. Experimental results presented in this paper show that the proposed method has significantly improved embedding capacities over the approach proposed by Jung and Yoo.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Image Captioning Generator using Deep Machine Learningijtsrd
Technologys scope has evolved into one of the most powerful tools for human development in a variety of fields.AI and machine learning have become one of the most powerful tools for completing tasks quickly and accurately without the need for human intervention. This project demonstrates how deep machine learning can be used to create a caption or a sentence for a given picture. This can be used for visually impaired persons, as well as automobiles for self identification, and for various applications to verify quickly and easily. The Convolutional Neural Network CNN is used to describe the alphabet, and the Long Short Term Memory LSTM is used to organize the right meaningful sentences in this model. The flicker 8k and flicker 30k datasets were used to train this. Sreejith S P | Vijayakumar A "Image Captioning Generator using Deep Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42344.pdf Paper URL: https://www.ijtsrd.comcomputer-science/artificial-intelligence/42344/image-captioning-generator-using-deep-machine-learning/sreejith-s-p
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
The document proposes a reversible data hiding method that embeds secret bits into a compressed thumbnail image during an image interpolation process. As the original thumbnail is scaled up to the original size, secret data is embedded by modifying pixel values based on their maximum and minimum neighboring pixel values in the original thumbnail. Experimental results show this method achieves higher embedding capacities than an existing approach.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
This document presents a novel image steganography technique based on discrete wavelet transform (DWT) and Huffman encoding. The technique embeds a secret image into a cover image in the frequency domain after applying DWT. It first Huffman encodes the secret image, then embeds the encoded bits in the high frequency DWT coefficients of the cover image. Experimental results show the technique achieves a high embedding capacity while maintaining a good peak signal-to-noise ratio between the cover and stego images, providing both invisibility and security as the secret image cannot be extracted without the Huffman table. Compared to an existing DWT-based method, the proposed technique provides better image quality for the same embedding capacity.
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
The document summarizes previous work on mosaic image steganography and proposes using genetic algorithms and key-based random permutation to improve the technique. Mosaic image steganography hides a secret image by dividing it into fragments and embedding the fragments into a target image to create a mosaic. Previous methods required a large database of images or allowed only arbitrary target image selection. The proposed method uses genetic algorithms to generate a mapping sequence for embedding tile images without a database, improving clarity and reducing computational complexity. It also applies a key-based random permutation to the mapping sequence for enhanced security and robustness. The mosaic image can be recovered using the same key and mapping sequence, making it a lossless data hiding method.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
A simple framework for contrastive learning of visual representationsDevansh16
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99
If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money.
Check out my other articles on Medium. : https://rb.gy/zn1aiu
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels.
Comments: ICML'2020. Code and pretrained models at this https URL
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
Cite as: arXiv:2002.05709 [cs.LG]
(or arXiv:2002.05709v3 [cs.LG] for this version)
Submission history
From: Ting Chen [view email]
[v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB)
[v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB)
[v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...ijma
Object detection and recognition is an important task in many computer vision applications. In this paper
an Android application was developed using Eclipse IDE and OpenCV3 Library. This application is able to
detect objects in an image that is loaded from the mobile gallery, based on its color, shape, or local
features. The image is processed in the HSV color domain for better color detection. Circular shapes are
detected using Circular Hough Transform and other shapes are detected using Douglas-Peucker
algorithm. BRISK (binary robust invariant scalable keypoints) local features were applied in the developed
Android application for matching an object image in another scene image. The steps of the proposed
detection algorithms are described, and the interfaces of the application are illustrated. The application is
ported and tested on Galaxy S3, S6, and Note1 Smartphones. Based on the experimental results, the
application is capable of detecting eleven different colors, detecting two dimensional geometrical shapes
including circles, rectangles, triangles, and squares, and correctly match local features of object and scene
images for different conditions. The application could be used as a standalone application, or as a part of
another application such as Robot systems, traffic systems, e-learning applications, information retrieval
and many others.
A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...ijma
The collage is an artistic method to create a new image by combining multiple images under some rules or
conditions for collage creators. To realize a mechanism to interpret “Kansei” of the collage creator by the
combination process of multiple image-materials and a formed collage image, we propose a new system to
analyze the collage work by using a database stored to each collage creation information. The collage
works which a creator made by using this system was evaluated. And also, we clarified how to combine
image-materials to make the good collage image having specific impression.
A robust combination of dwt and chaotic function for image watermarkingijctet
This document summarizes a research paper on a robust image watermarking technique that combines discrete wavelet transform (DWT) and a chaotic function. The proposed method embeds a watermark into selected blocks of the low-frequency DWT subband of an image. It calculates the Euclidean distance between blocks of the watermark and image to select the most similar block for embedding. Experimental results on standard test images show the proposed method achieves better performance than previous methods in terms of PSNR and structural similarity under compression attacks. The extraction accuracy remains high even with noise attacks, though it degrades more under filtering attacks.
Cecimg an ste cryptographic approach for data security in imageijctet
The document presents a new algorithm called CECIMG (Canny edge encryption image steganography) for securing data in images. It combines Blowfish encryption with embedding encrypted data in the edge pixels of an image detected using Canny edge detection. The algorithm is implemented in Java and experiments show it provides better security and higher PSNR values than existing LSB steganography techniques. It securely stores encrypted data in images in a series of steps and allows retrieval of the original data. The algorithm aims to maximize security compared to traditional approaches.
A new image steganography algorithm basedIJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very
important to secure information transmission between the sender and receiver. Therefore, steganography
introduces strongly to hide information and to communicate a secret data in an appropriate multimedia
carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has
been proposed to hide a large amount of secret data presented by secret color image. This algorithm is
based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the
DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach
has been applied before embedding process. The number of bit to be replaced at each byte is non uniform,
it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that
the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity
reached to four bits per byte.
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
The Least Significant Bit (LSB) algorithm and the Most Significant Bit (MSB) algorithm are stenography algorithms with each one having its demerits. This work therefore proposed a Hybrid approach and compared its efficiency with LSB and MSB algorithms. The Least Significant Bit (LSB) and Most
Significant Bit (MSB) techniques were combined in the proposed algorithm. Two bits (the least significant bit and the most significant bit) of the cover images were replaced with a secret message. Comparisons were made based on Mean-Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR) and the encoding time between the proposed algorithm, LSB and MSB after embedding in digital images. The combined
technique produced a stego-image with minimal distortion in image quality than MSB technique independent of the nature of data that was hidden. However, LSB algorithm produced the best stego-image quality. Large cover images however made the combined algorithm’s quality better improved. The combined algorithm had lesser time of image and text encoding. Therefore, a trade-off exists between the encoding time and the quality of stego-image as demonstrated in this work.
This document summarizes an article that proposes a new image steganography technique using discrete wavelet transform. The technique applies an adaptive pixel pair matching method from the spatial domain to the frequency domain. Data is embedded in the middle frequencies of the discrete wavelet transformed image because they are more robust to attacks than high frequencies. The coefficients in the low frequency sub-band are preserved unchanged to improve image quality. The experimental results showed better performance with discrete wavelet transform compared to the spatial domain.
IRJET- An Improved Technique for Hiding Secret Image on Colour Images usi...IRJET Journal
This document presents a hybrid steganography technique that embeds a secret image into a cover image using discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD). The cover image is decomposed using DWT and its high frequency components are replaced with the secret image, which is first decomposed using SVD and DCT. Experimental results show correlation coefficients above 0.999 when extracting the secret image, indicating high quality extraction. The technique provides improved steganography by embedding the secret image in the visually insensitive high frequency components of the cover image.
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
In this paper, we propose a reversible data hiding method in the spatial domain for compressed grayscale images. The proposed method embeds secret bits into a compressed thumbnail of the original image by using a novel interpolation method and the Neighbour Mean Interpolation (NMI) technique as scaling up to the original image occurs. Experimental results presented in this paper show that the proposed method has significantly improved embedding capacities over the approach proposed by Jung and Yoo.
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
Multimedia applications are becoming increasingly significant in modern world. The mushroom growth of multimedia data of these applications, particularly over the web has increased the demand for protection of copyright. Digital watermarking is much more acceptable as a solution to the problem of copyright protection and authentication of multimedia data while working in a networked environment. In this paper, a DWT based watermarking scheme is proposed. We have used Genetic Algorithm (GA) in order to make an optimum tradeoff between imperceptibility and robustness by choosing an optimum watermarking level for each coefficient of the cover image. In addition to the suitable watermarking strength, the selection of best block size is also necessary for superior perceptual shaping functions. To achieve this goal we have trained and used GA to pick the best block size to tailor the watermark in one of the coefficients of the DWT. The fitness function criterion for the genetic algorithm decision making is based on PSNR values
Image Captioning Generator using Deep Machine Learningijtsrd
Technologys scope has evolved into one of the most powerful tools for human development in a variety of fields.AI and machine learning have become one of the most powerful tools for completing tasks quickly and accurately without the need for human intervention. This project demonstrates how deep machine learning can be used to create a caption or a sentence for a given picture. This can be used for visually impaired persons, as well as automobiles for self identification, and for various applications to verify quickly and easily. The Convolutional Neural Network CNN is used to describe the alphabet, and the Long Short Term Memory LSTM is used to organize the right meaningful sentences in this model. The flicker 8k and flicker 30k datasets were used to train this. Sreejith S P | Vijayakumar A "Image Captioning Generator using Deep Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42344.pdf Paper URL: https://www.ijtsrd.comcomputer-science/artificial-intelligence/42344/image-captioning-generator-using-deep-machine-learning/sreejith-s-p
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
With the rapid development of technology, and the popularization of internet, communication is been greatly promoted. The communication is not limited only to information but also includes multimedia information like digital Images. Therefore, the security of digital images has become a very important and practical issue, and appropriate security technology is used for those digital images containing confidential or private information especially. In this paper a novel approach of Image scrambling has been proposed which includes both spatial as well as Transform domain. Experimental results prove that correlation obtained in scrambled images is much lesser then the one obtained in transformed images.
The document proposes a reversible data hiding method that embeds secret bits into a compressed thumbnail image during an image interpolation process. As the original thumbnail is scaled up to the original size, secret data is embedded by modifying pixel values based on their maximum and minimum neighboring pixel values in the original thumbnail. Experimental results show this method achieves higher embedding capacities than an existing approach.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
Digital image Encryption techniques play a very important role to prevent image from unauthorized access. There are many types of methods available that can do Image Encryption, and the majority of them are scrambling algorithms based on pixel shuffling, which cannot change the histogram of an image. Hence, their security performances are not good. The encryption method that combines the pixel exchanging and gray level changing can handles reach a good chaotic effect. In this paper we focus on an image encryption technique based on pixel wise shuffling with the help of skew tent map and text based pixel substitution. The PSNR, NPCR and CC obtained by our technique shows that the proposed technique gives better result than the existing techniques.
A Novel Technique for Image Steganography Based on DWT and Huffman EncodingCSCJournals
This document presents a novel image steganography technique based on discrete wavelet transform (DWT) and Huffman encoding. The technique embeds a secret image into a cover image in the frequency domain after applying DWT. It first Huffman encodes the secret image, then embeds the encoded bits in the high frequency DWT coefficients of the cover image. Experimental results show the technique achieves a high embedding capacity while maintaining a good peak signal-to-noise ratio between the cover and stego images, providing both invisibility and security as the secret image cannot be extracted without the Huffman table. Compared to an existing DWT-based method, the proposed technique provides better image quality for the same embedding capacity.
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
The document summarizes previous work on mosaic image steganography and proposes using genetic algorithms and key-based random permutation to improve the technique. Mosaic image steganography hides a secret image by dividing it into fragments and embedding the fragments into a target image to create a mosaic. Previous methods required a large database of images or allowed only arbitrary target image selection. The proposed method uses genetic algorithms to generate a mapping sequence for embedding tile images without a database, improving clarity and reducing computational complexity. It also applies a key-based random permutation to the mapping sequence for enhanced security and robustness. The mosaic image can be recovered using the same key and mapping sequence, making it a lossless data hiding method.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
A simple framework for contrastive learning of visual representationsDevansh16
Link: https://machine-learning-made-simple.medium.com/learnings-from-simclr-a-framework-contrastive-learning-for-visual-representations-6c145a5d8e99
If you'd like to discuss something, text me on LinkedIn, IG, or Twitter. To support me, please use my referral link to Robinhood. It's completely free, and we both get a free stock. Not using it is literally losing out on free money.
Check out my other articles on Medium. : https://rb.gy/zn1aiu
My YouTube: https://rb.gy/88iwdd
Reach out to me on LinkedIn. Let's connect: https://rb.gy/m5ok2y
My Instagram: https://rb.gy/gmvuy9
My Twitter: https://twitter.com/Machine01776819
My Substack: https://devanshacc.substack.com/
Live conversations at twitch here: https://rb.gy/zlhk9y
Get a free stock on Robinhood: https://join.robinhood.com/fnud75
This paper presents SimCLR: a simple framework for contrastive learning of visual representations. We simplify recently proposed contrastive self-supervised learning algorithms without requiring specialized architectures or a memory bank. In order to understand what enables the contrastive prediction tasks to learn useful representations, we systematically study the major components of our framework. We show that (1) composition of data augmentations plays a critical role in defining effective predictive tasks, (2) introducing a learnable nonlinear transformation between the representation and the contrastive loss substantially improves the quality of the learned representations, and (3) contrastive learning benefits from larger batch sizes and more training steps compared to supervised learning. By combining these findings, we are able to considerably outperform previous methods for self-supervised and semi-supervised learning on ImageNet. A linear classifier trained on self-supervised representations learned by SimCLR achieves 76.5% top-1 accuracy, which is a 7% relative improvement over previous state-of-the-art, matching the performance of a supervised ResNet-50. When fine-tuned on only 1% of the labels, we achieve 85.8% top-5 accuracy, outperforming AlexNet with 100X fewer labels.
Comments: ICML'2020. Code and pretrained models at this https URL
Subjects: Machine Learning (cs.LG); Computer Vision and Pattern Recognition (cs.CV); Machine Learning (stat.ML)
Cite as: arXiv:2002.05709 [cs.LG]
(or arXiv:2002.05709v3 [cs.LG] for this version)
Submission history
From: Ting Chen [view email]
[v1] Thu, 13 Feb 2020 18:50:45 UTC (5,093 KB)
[v2] Mon, 30 Mar 2020 15:32:51 UTC (5,047 KB)
[v3] Wed, 1 Jul 2020 00:09:08 UTC (5,829 KB)
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
DEVELOPMENT OF AN ANDROID APPLICATION FOR OBJECT DETECTION BASED ON COLOR, SH...ijma
Object detection and recognition is an important task in many computer vision applications. In this paper
an Android application was developed using Eclipse IDE and OpenCV3 Library. This application is able to
detect objects in an image that is loaded from the mobile gallery, based on its color, shape, or local
features. The image is processed in the HSV color domain for better color detection. Circular shapes are
detected using Circular Hough Transform and other shapes are detected using Douglas-Peucker
algorithm. BRISK (binary robust invariant scalable keypoints) local features were applied in the developed
Android application for matching an object image in another scene image. The steps of the proposed
detection algorithms are described, and the interfaces of the application are illustrated. The application is
ported and tested on Galaxy S3, S6, and Note1 Smartphones. Based on the experimental results, the
application is capable of detecting eleven different colors, detecting two dimensional geometrical shapes
including circles, rectangles, triangles, and squares, and correctly match local features of object and scene
images for different conditions. The application could be used as a standalone application, or as a part of
another application such as Robot systems, traffic systems, e-learning applications, information retrieval
and many others.
A COLLAGE IMAGE CREATION & “KANISEI” ANALYSIS SYSTEM BY COMBINING MULTIPLE IM...ijma
The collage is an artistic method to create a new image by combining multiple images under some rules or
conditions for collage creators. To realize a mechanism to interpret “Kansei” of the collage creator by the
combination process of multiple image-materials and a formed collage image, we propose a new system to
analyze the collage work by using a database stored to each collage creation information. The collage
works which a creator made by using this system was evaluated. And also, we clarified how to combine
image-materials to make the good collage image having specific impression.
IMAGE DENOISING BY MEDIAN FILTER IN WAVELET DOMAINijma
The details of an image with noise may be restored by removing noise through a suitable image de-noising
method. In this research, a new method of image de-noising based on using median filter (MF) in the
wavelet domain is proposed and tested. Various types of wavelet transform filters are used in conjunction
with median filter in experimenting with the proposed approach in order to obtain better results for image
de-noising process, and, consequently to select the best suited filter. Wavelet transform working on the
frequencies of sub-bands split from an image is a powerful method for analysis of images. According to this
experimental work, the proposed method presents better results than using only wavelet transform or
median filter alone. The MSE and PSNR values are used for measuring the improvement in de-noised
images.
AECC global is an accredited Australian educational agency operating 15 offices in 5 countries globally. Agency helps in visa application, immigration clearance, PTE test, professional year, scholarship and offer hassle free studying abroad for students.
Things for intrapreneurs to keep ideas aliveeTailing India
Developing successful corporate entrepreneurship initiatives is particularly important because it offers organizations a strategy for profitable growth and serves as an attractive alternative to old, acquisition-led, inorganic growth strategies. But the challenges of achieving this can be daunting, especially for those in the entrepreneurial team itself. For example, it's one thing to recognize the importance of getting people to work for your cause; it’s a different story to execute your plan when you don’t have any positional authority or financial resources behind you.
This document provides a guide for ACC 290 Final Exam with 30 multiple choice questions covering various accounting topics like inventory valuation, internal controls, financial statements, and international accounting standards. It also includes links to purchase the exam guide and visit the website for more classes.
A NOVEL METHOD FOR PERSON TRACKING BASED K-NN : COMPARISON WITH SIFT AND MEAN...sipij
Object tracking can be defined as the process of detecting an object of interest from a video scene and
keeping track of its motion, orientation, occlusion etc. in order to extract useful information. It is indeed a
challenging problem and it’s an important task. Many researchers are getting attracted in the field of
computer vision, specifically the field of object tracking in video surveillance. The main purpose of this
paper is to give to the reader information of the present state of the art object tracking, together with
presenting steps involved in Background Subtraction and their techniques. In related literature we found
three main methods of object tracking: the first method is the optical flow; the second is related to the
background subtraction, which is divided into two types presented in this paper, then the temporal
differencing and the SIFT method and the last one is the mean shift method. We present a novel approach
to background subtraction that compare a current frame with the background model that we have set
before, so we can classified each pixel of the image as a foreground or a background element, then comes
the tracking step to present our object of interest, which is a person, by his centroid. The tracking step is
divided into two different methods, the surface method and the K-NN method, both are explained in the
paper. Our proposed method is implemented and evaluated using CAVIAR database.
ROBUST FEATURE EXTRACTION USING AUTOCORRELATION DOMAIN FOR NOISY SPEECH RECOG...sipij
Previous research has found autocorrelation domain as an appropriate domain for signal and noise
separation. This paper discusses a simple and effective method for decreasing the effect of noise on the
autocorrelation of the clean signal. This could later be used in extracting mel cepstral parameters for
speech recognition. Two different methods are proposed to deal with the effect of error introduced by
considering speech and noise completely uncorrelated. The basic approach deals with reducing the effect
of noise via estimation and subtraction of its effect from the noisy speech signal autocorrelation. In order
to improve this method, we consider inserting a speech/noise cross correlation term into the equations used
for the estimation of clean speech autocorrelation, using an estimate of it, found through Kernel method.
Alternatively, we used an estimate of the cross correlation term using an averaging approach. A further
improvement was obtained through introduction of an overestimation parameter in the basic method. We
tested our proposed methods on the Aurora 2 task. The Basic method has shown considerable improvement
over the standard features and some other robust autocorrelation-based features. The proposed techniques
have further increased the robustness of the basic autocorrelation-based method.
El documento resume el Mobile World Congress 2017, incluyendo datos de impacto económico, lanzamientos de nuevos dispositivos por parte de la industria móvil, y las principales tendencias tecnológicas como 5G, Internet de las Cosas, realidad virtual y aumentada, vehículos conectados y blockchain. Además, ofrece información sobre la filosofía de trabajo de la compañía Enzyme basada en la transformación, innovación y excelencia.
Este documento describe el uso de la tecnología como una herramienta para el juego y el aprendizaje en niños pequeños. Explica que los niños aprenden a través del juego y que la tecnología como interruptores, pantallas táctiles y computadoras pueden facilitar el juego y desarrollo de habilidades. También destaca que la tecnología puede brindar oportunidades únicas para enseñar y mejorar la vida de niños con discapacidades.
This document outlines an activity to analyze representations of age in TV drama. Students will watch a scene four times and take notes on technical elements like camera work and editing. They will then analyze how age is constructed in an online video extract, focusing on how stereotypes of different age groups are conformed to or challenged through techniques like camera angles, soundtracks, and dialogue.
This document describes the author's favorite place, a small stone hut located on a hill called "Malladés" that was built by her great-grandfather 50 years ago. The hut has three stone seats and was originally used by the author's great-grandfather as shelter while working the nearby fields. Now it is used by the author's grandfather to store machinery, but also provides a scenic spot to enjoy a picnic and listen to birds singing.
The document discusses the target audience for a music video and song. The target audience is primarily women ages 16-25 who are likely to experience heartbreak and connect with a song about that topic. Research concluded that this age group listens to a lot of music, including indie and pop genres. The target audience shops at stores like Urban Outfitters, spends time with friends, and has a student income level. The research determined that women ages 16-25 who like indie music also prefer pop, so the video should have elements of both genres to appeal to this demographic.
INNOVATIVE AND SOCIAL TECHNOLOGIES ARE REVOLUTIONIZING SAUDI CONSUMER ATTITUD...ijsptm
The Internet today connects about 40% of the world population. Half of these are living outside the
advanced economies, often in some countries that are quickly climbing the developmental ladder, with
diverse populations and inarguable economic potentialities including Saudi Arabia. There are 20 million
Internet users in Saudi Arabia by the end of 2016. This research examines the impact of the Internet,
innovation, disruption and the dynamics that affect adoption of electronic commerce (e-commerce) in
Saudi Arabia. The study further analyzes the influence of Internet security and its impact on the users’
decision-making process. The data have gathered through questionnaires that disseminated to 2,823 Saudi
Internet male and female users through email. The response rate was 23%. The important findings have
discussed in this study that shows that there are significant factors that are influencing the adoption of ecommerce,
including legal procedures to ease of doing business, ease of doing businesses and security
features and controls introduced by the online vendors.
A PROPOSED MULTI-DOMAIN APPROACH FOR AUTOMATIC CLASSIFICATION OF TEXT DOCUMENTSijsc
Classification is an important technique used in information retrieval. Supervised classification suffers
from certain limitations concerning the collection and labeling of the training dataset. When facing Multi-
Domain classification, multiple training datasets and classifiers are needed which is relatively difficult. In
this paper an unsupervised classification system is proposed that can manage the Multi-Domain
classification problem as well. It is a multi-domain system where each domain represented by an ontology.
A document is mapped on each ontology based on the weights of the mutual tokens between them with the
help of fuzzy sets, resulting in a mapping degree of the document with each domain. An experiment carried
out showing satisfying classification results with an improvement in the evaluation results of the proposed
system compared to Apache Lucene.
MULTIMODAL BIOMETRICS RECOGNITION FROM FACIAL VIDEO VIA DEEP LEARNINGsipij
Biometrics identification using multiple modalities has attracted the attention of many researchers as it
produces more robust and trustworthy results than single modality biometrics. In this paper, we present a
novel multimodal recognition system that trains a Deep Learning Network to automatically learn features
after extracting multiple biometric modalities from a single data source, i.e., facial video clips. Utilizing
different modalities, i.e., left ear, left profile face, frontal face, right profile face, and right ear, present in
the facial video clips, we train supervised denoising auto-encoders to automatically extract robust and nonredundant
features. The automatically learned features are then used to train modality specific sparse
classifiers to perform the multimodal recognition. Experiments conducted on the constrained facial video
dataset (WVU) and the unconstrained facial video dataset (HONDA/UCSD), resulted in a 99.17% and
97.14% rank-1 recognition rates, respectively. The multimodal recognition accuracy demonstrates the
superiority and robustness of the proposed approach irrespective of the illumination, non-planar
movement, and pose variations present in the video clips.
A PREDICTION METHOD OF GESTURE TRAJECTORY BASED ON LEAST SQUARES FITTING MODELVLSICS Design
Implicit interaction based on context information is widely used and studied in the virtual scene. In context
based human computer interaction, the meaning of action A is well defined. For instance, the right wave is
defined turning paper or PPT in context B, And it mean volume up in context C. However, we cannot use
the context information when we select the object to be manipulated. In view of this situation, this paper
proposes using the least squares fitting curve beam to predict the user's trajectory, so as to determine what
object the user’s wants to operate. At the same time, the fitting effects of the three curves were compared,
and the curve which is more accord with the hand movement trajectory is obtained. In addition, using the
bounding box size control the Z variable to move in an appropriate location. Experimental results show
that the proposed in this paper based on bounding box size to control the Z variables get a good effect; by
fitting the trajectory of a human hand, to predict the object that the subjects would like to operate. The
correct rate is 91%.
Natural Language Toolkit (NLTK) is a generic platform to process the data of various natural (human)
languages and it provides various resources for Indian languages also like Hindi, Bangla, Marathi and so
on. In the proposed work, the repositories provided by NLTK are used to carry out the processing of Hindi
text and then further for analysis of Multi word Expressions (MWEs). MWEs are lexical items that can be
decomposed into multiple lexemes and display lexical, syntactic, semantic, pragmatic and statistical
idiomaticity. The main focus of this paper is on processing and analysis of MWEs for Hindi text. The
corpus used for Hindi text processing is taken from the famous Hindi novel “KaramaBhumi by Munshi
PremChand”. The result analysis is done using the Hindi corpus provided by Resource Centre for Indian
Language Technology Solutions (CFILT). Results are analysed to justify the accuracy of the proposed
work.
A Review of Comparison Techniques of Image SteganographyIOSR Journals
This document reviews and compares three common techniques for hiding information in digital images: Least Significant Bit (LSB) steganography, Discrete Cosine Transform (DCT) steganography, and Discrete Wavelet Transform (DWT) steganography. LSB is implemented in the spatial domain by replacing the least significant bits of cover image pixels with payload bits. DCT and DWT are implemented in the frequency domain by transforming the cover image and embedding payload bits in the transformed coefficients. The document evaluates and compares the performance of these three techniques based on metrics like mean squared error, peak signal-to-noise ratio, embedding capacity, and robustness.
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
The document summarizes a research paper presented at the National Conference on Emerging Trends in Information and Computing Technologies. The paper proposes a novel steganographic technique that embeds data by altering the least significant bit of low frequency discrete cosine transform coefficients of image blocks. Experimental results showed the technique has a better peak signal-to-noise ratio value and higher data capacity compared to other techniques like least significant bit, modulus arithmetic, and SSB4-DCT embedding. It also maintains satisfactory security as the secret message cannot be extracted without knowing the decoding algorithm.
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. First, the cover image is converted into a wavelet environment using the integer wavelet transform (IWT), which protects the cover images from false mistakes. The grey wolf optimizer (GWO) is used to choose the pixel’s image that would be utilized to insert the hidden image in the cover image. GWO effectively selects pixels by calculating entropy, pixel intensity, and fitness function using the cover images. Moreover, the secret image was encrypted by utilizing a proposed hyper-chaotic improved Henon map and fractal Tromino. The suggested method increases computational security and efficiency with increased embedding capacity. Following the embedding algorithm of the secret image and the alteration of the cover image, the least significant bit (LSB) is utilized to locate the tempered region and to provide self-recovery characteristics in the digital image. According to the findings, the proposed technique provides a more secure transmission network with lower complexity in terms of peak signal-to-noise ratio (PSNR), normalized cross correlation (NCC), structural similarity index (SSIM), entropy and mean square error (MSE). As compared to the current approaches, the proposed method performed better in terms of PSNR 70.58% Db and SSIM 0.999 respectively.
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret image. This is proved by the high PSNR (Peak Signal to Noise Ratio), value for both stego and extracted secret image. The results are compared with the results of similar techniques and it is found that the proposed technique is simple and gives better PSNR values than others.
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide information and to communicate a secret data in an appropriate multimedia carrier, e.g., image, audio and video files. In this paper, a new algorithm for image steganography has been proposed to hide a large amount of secret data presented by secret color image. This algorithm is based on different size image segmentations (DSIS) and modified least significant bits (MLSB), where the DSIS algorithm has been applied to embed a secret image randomly instead of sequentially; this approach has been applied before embedding process. The number of bit to be replaced at each byte is non uniform, it bases on byte characteristics by constructing an effective hypothesis. The simulation results justify that the proposed approach is employed efficiently and satisfied high imperceptible with high payload capacity reached to four bits per byte.
IRJET- Machine Learning Application for Data SecurityIRJET Journal
1) The document proposes a machine learning approach for improving data security through steganography. It hides secret messages in images by modifying pixel values and uses machine learning models like SVM and DNN for smoothing distorted images and retrieving lost data.
2) The method first appends a secret text file onto an image, then performs image-to-image steganography to provide additional security. It decrypts the stego images and uses an SVM for classification and noise removal, along with a DNN network model.
3) Experimental results show that as the size of the hidden text file increases, more noise is introduced, but the machine learning models can effectively smooth the images and retrieve the lost message bits.
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
This document summarizes a research paper that proposes a new methodology for reducing additive distortion in steganography. The paper introduces a method to embed 2 bits of information in a pixel by altering only one bit plane. This is expected to make detection of covert communication more difficult for steganalysis algorithms compared to altering the least significant bit. The method uses Java for implementation and MATLAB to analyze histograms of original and stego images. Experimental results on embedding secret text in images are presented, along with analysis of the distortion levels and security of the proposed approach.
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
We follow "Rigorous Publication" model - means that all articles appear on IJERD after full appraisal, effectiveness, legitimacy and reliability of research content. International Journal of Engineering Research and Development publishes papers online as well as provide hard copy of Journal to authors after publication of paper. It is intended to serve as a forum for researchers, practitioners and developers to exchange ideas and results for the advancement of Engineering & Technology.
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
This document summarizes a proposed cryptographic technique that combines steganography and chaotic image encryption to provide high security. Steganography is used to hide a message within a cover image by embedding it in the least significant bits of pixel values without affecting image quality. The resulting stego-image is then encrypted using triple-key chaotic image encryption based on the logistic map, making the encrypted data highly sensitive to changes in the initial encryption keys. The technique provides four layers of security to securely transmit hidden messages within digital images.
1. The document discusses data hiding techniques for images, specifically uniform embedding. It reviews existing methods like LSB substitution and proposes developing a new technique to select pixels for embedding, reduce embedded text size, and increase confidentiality.
2. It surveys related work on minimizing distortion in steganography, a modified matrix encoding technique for low distortion, and designing adaptive steganographic schemes.
3. The objectives are to develop a new pixel selection technique for embedding, reduce embedded text size, and increase resistance to extraction through high confidentiality. The significance is providing a solution to digital image steganography problems and focusing on choosing pixels to embed text under conditions.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
This document analyzes DCT-based steganography using a modified JPEG luminance quantization table to improve evaluation parameters like PSNR, mean square error, and capacity. The authors propose modifying the default 8x8 quantization table by adjusting frequency values in 4 bands to increase image quality for the embedded stego image. Experimental results on test images show that using the modified table improves PSNR, decreases mean square error, and increases maximum embedding capacity compared to the default table. Therefore, the proposed method allows more secret data to be hidden with less distortion and improved image quality.
This document analyzes DCT-based steganography using a modified JPEG luminance quantization table to improve embedding capacity and image quality. The authors propose modifying the default 8x8 quantization table by changing frequency values to increase the peak signal-to-noise ratio and capacity while decreasing the mean square error of embedded images. Experimental results on test images show increased capacity, PSNR and reduced error when using the modified versus default table, indicating improved stego image quality. The proposed method aims to securely embed more data with less distortion than traditional DCT-based steganography.
Design secure multi-level communication system based on duffing chaotic map a...IJEECSIAES
Cryptography and steganography are among the most important sciences that have been properly used to keep confidential data from potential spies and hackers. They can be used separately or together. Encryption involves the basic principle of instantaneous conversion of valuable information into a specific form that unauthorized persons will not understand to decrypt it. While steganography is the science of embedding confidential data inside a cover, in a way that cannot be recognized or seen by the human eye. This paper presents a high-resolution chaotic approach applied to images that hide information. A more secure and reliable system is designed to properly include confidential data transmitted through transmission channels. This is done by working the use of encryption and steganography together. This work proposed a new method that achieves a very high level of hidden information based on non-uniform systems by generating a random index vector (RIV) for hidden data within least significant bit (LSB) image pixels. This method prevents the reduction of image quality. The simulation results also show that the peak signal to noise ratio (PSNR) is up to 74.87 dB and the mean square error (MSE) values is up to 0.0828, which sufficiently indicates the effectiveness of the proposed algorithm.
Design secure multi-level communication system based on duffing chaotic map a...nooriasukmaningtyas
This document proposes a new method for secure multi-level communication using duffing chaotic maps and steganography. The method generates a random index vector (RIV) to determine pixel locations for embedding secret data in the least significant bits of an image. Simulation results show the proposed method achieves high quality steganography with a peak signal to noise ratio up to 74.87 dB and low mean squared error of 0.0828, indicating effectiveness. The document also reviews related work in chaotic maps, image steganography techniques, and metrics for evaluating steganography systems based on mean squared error, peak signal to noise ratio, and structural similarity index.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
Steganography is an authenticated technique for maintaining secrecy of embedded data. Steganography provides hardness of detecting the hidden data and has a potential capacity to hide the existence of confidential data. In this paper, we propose a novel steganography using coefficient replacement and adaptive scaling based on Dual Tree Complex Wavelet Transform (DTCWT) technique. The DTCWT and LWT 2 is applied on cover image and payload respectively to convert spatial domain into transform domain. The HH sub band coefficients of cover image are replaced by the LL sub band coefficients of payload to generate intermediate stego object and the adaptive scaling factor is used to scale down intermediate stego object coefficient values to generate final stego object. The adaptive scaling factor is determined based on entropy of cover image. The security and the capacity of the proposed method are high compared to the existing algorithms.
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
Due to enormous increase in the usage of computers and mobiles, today’s world is currently flooded with
huge volumes of data. This paper is primarily focused on multimedia data and how it can be protected
from unwanted attacks. Sharing of multimedia data is easy and very efficient, it has been a customary
practice to share multimedia data but there is no proper encryption technique to encrypt multimedia data.
Sharing of multimedia data over unprotected networks using DCT algorithm and then applying selective
encryption-based algorithm has never been adequately studied. This paper introduces a new selective
encryption-based security system which will transfer data with protection even in unauthenticated network.
Selective encryption-based security system will also minimize time during encryption process which there
by achieves efficiency. The data in the image is transmitted over a network is discriminated using DCT
transform and then it will be selectively encrypted using Number Puzzle technique, and thus provides
security from unauthorized access. This paper discusses about numeric puzzle-based encryption technique
and how it can achieve security and integrity for multimedia data over traditional encryption technique.
AI in Java - MCP in Action, Langchain4J-CDI, SmallRye-LLM, Spring AIBuhake Sindi
This is the presentation I gave with regards to AI in Java, and the work that I have been working on. I've showcased Model Context Protocol (MCP) in Java, creating server-side MCP server in Java. I've also introduced Langchain4J-CDI, previously known as SmallRye-LLM, a CDI managed too to inject AI services in enterprise Java applications. Also, honourable mention: Spring AI.
Marko.js - Unsung Hero of Scalable Web Frameworks (DevDays 2025)Eugene Fidelin
Marko.js is an open-source JavaScript framework created by eBay back in 2014. It offers super-efficient server-side rendering, making it ideal for big e-commerce sites and other multi-page apps where speed and SEO really matter. After over 10 years of development, Marko has some standout features that make it an interesting choice. In this talk, I’ll dive into these unique features and showcase some of Marko's innovative solutions. You might not use Marko.js at your company, but there’s still a lot you can learn from it to bring to your next project.
Agentic AI - The New Era of IntelligenceMuzammil Shah
This presentation is specifically designed to introduce final-year university students to the foundational principles of Agentic Artificial Intelligence (AI). It aims to provide a clear understanding of how Agentic AI systems function, their key components, and the underlying technologies that empower them. By exploring real-world applications and emerging trends, the session will equip students with essential knowledge to engage with this rapidly evolving area of AI, preparing them for further study or professional work in the field.
In recent years, the proliferation of generative AI technology has revolutionized the landscape of media content creation, enabling even the average user to fabricate convincing videos, images, text, and audio. However, this advancement has also exacerbated the issue of online disinformation, which is spiraling out of control due to the vast reach of social media platforms, sophisticated campaigns, and the proliferation of deepfakes. After an introduction including the significant impact on key societal values such as Democracy, Public Health and Peace, the talk focuses on techniques to detect visual disinformation, manipulated photos/video, deepfakes and visuals out of context. While AI technologies offer promising avenues for addressing disinformation, it is clear that they alone are not sufficient to address this complex and multifaceted problem. Limitations of current AI approaches will be discussed, along with broader human behaviour, societal and financial challenges that must be addressed to effectively combat online disinformation. A holistic approach that encompasses technological, regulatory, and educational interventions, developing critical thought will be finally presented.
AI stands for Artificial Intelligence.
It refers to the ability of a computer system or machine to perform tasks that usually require human intelligence, such as:
thinking,
learning from experience,
solving problems, and
making decisions.
GDG Cloud Southlake #43: Tommy Todd: The Quantum Apocalypse: A Looming Threat...James Anderson
The Quantum Apocalypse: A Looming Threat & The Need for Post-Quantum Encryption
We explore the imminent risks posed by quantum computing to modern encryption standards and the urgent need for post-quantum cryptography (PQC).
Bio: With 30 years in cybersecurity, including as a CISO, Tommy is a strategic leader driving security transformation, risk management, and program maturity. He has led high-performing teams, shaped industry policies, and advised organizations on complex cyber, compliance, and data protection challenges.
With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...SOFTTECHHUB
With the introduction of Claude Opus 4 and Sonnet 4, Anthropic's newest generation of AI models is not just an incremental step but a pivotal moment, fundamentally reshaping what's possible in software development, complex problem-solving, and intelligent business automation.
Adtran’s new Ensemble Cloudlet vRouter solution gives service providers a smarter way to replace aging edge routers. With virtual routing, cloud-hosted management and optional design services, the platform makes it easy to deliver high-performance Layer 3 services at lower cost. Discover how this turnkey, subscription-based solution accelerates deployment, supports hosted VNFs and helps boost enterprise ARPU.
Offshore IT Support: Balancing In-House and Offshore Help Desk Techniciansjohn823664
In today's always-on digital environment, businesses must deliver seamless IT support across time zones, devices, and departments. This SlideShare explores how companies can strategically combine in-house expertise with offshore talent to build a high-performing, cost-efficient help desk operation.
From the benefits and challenges of offshore support to practical models for integrating global teams, this presentation offers insights, real-world examples, and key metrics for success. Whether you're scaling a startup or optimizing enterprise support, discover how to balance cost, quality, and responsiveness with a hybrid IT support strategy.
Perfect for IT managers, operations leads, and business owners considering global help desk solutions.
UiPath Community Zurich: Release Management and Build PipelinesUiPathCommunity
Ensuring robust, reliable, and repeatable delivery processes is more critical than ever - it's a success factor for your automations and for automation programmes as a whole. In this session, we’ll dive into modern best practices for release management and explore how tools like the UiPathCLI can streamline your CI/CD pipelines. Whether you’re just starting with automation or scaling enterprise-grade deployments, our event promises to deliver helpful insights to you. This topic is relevant for both on-premise and cloud users - as well as for automation developers and software testers alike.
📕 Agenda:
- Best Practices for Release Management
- What it is and why it matters
- UiPath Build Pipelines Deep Dive
- Exploring CI/CD workflows, the UiPathCLI and showcasing scenarios for both on-premise and cloud
- Discussion, Q&A
👨🏫 Speakers
Roman Tobler, CEO@ Routinuum
Johans Brink, CTO@ MvR Digital Workforce
We look forward to bringing best practices and showcasing build pipelines to you - and to having interesting discussions on this important topic!
If you have any questions or inputs prior to the event, don't hesitate to reach out to us.
This event streamed live on May 27, 16:00 pm CET.
Check out all our upcoming UiPath Community sessions at:
👉 https://community.uipath.com/events/
Join UiPath Community Zurich chapter:
👉 https://community.uipath.com/zurich/
For those who have ever wanted to recreate classic games, this presentation covers my five-year journey to build a NES emulator in Kotlin. Starting from scratch in 2020 (you can probably guess why), I’ll share the challenges posed by the architecture of old hardware, performance optimization (surprise, surprise), and the difficulties of emulating sound. I’ll also highlight which Kotlin features shine (and why concurrency isn’t one of them). This high-level overview will walk through each step of the process—from reading ROM formats to where GPT can help, though it won’t write the code for us just yet. We’ll wrap up by launching Mario on the emulator (hopefully without a call from Nintendo).
Supercharge Your AI Development with Local LLMsFrancesco Corti
In today's AI development landscape, developers face significant challenges when building applications that leverage powerful large language models (LLMs) through SaaS platforms like ChatGPT, Gemini, and others. While these services offer impressive capabilities, they come with substantial costs that can quickly escalate especially during the development lifecycle. Additionally, the inherent latency of web-based APIs creates frustrating bottlenecks during the critical testing and iteration phases of development, slowing down innovation and frustrating developers.
This talk will introduce the transformative approach of integrating local LLMs directly into their development environments. By bringing these models closer to where the code lives, developers can dramatically accelerate development lifecycles while maintaining complete control over model selection and configuration. This methodology effectively reduces costs to zero by eliminating dependency on pay-per-use SaaS services, while opening new possibilities for comprehensive integration testing, rapid prototyping, and specialized use cases.
Reducing Bugs With Static Code Analysis php tek 2025Scott Keck-Warren
Have you ever deployed code only to have it causes errors and unexpected results? By using static code analysis we can reduce, if not completely remove this risk. In this session, we'll discuss the basics of static code analysis, some free and inexpensive tools we can use, and how we can run the tools successfully.
Content and eLearning Standards: Finding the Best Fit for Your-TrainingRustici Software
Tammy Rutherford, Managing Director of Rustici Software, walks through the pros and cons of different standards to better understand which standard is best for your content and chosen technologies.
Wondershare Filmora 14.3.2 Crack + License Key Free for Windows PCMudasir
COPY & PASTE LINK 👉👉👉
https://pcsoftsfull.org/dl
Wondershare Filmora for Windows PC is an all-in-one home video editor with powerful functionality and a fully stacked feature set. Filmora has a simple drag-and-droptop interface, allowing you to be artistic with the story you want to create.
Wondershare Filmora 14.3.2 Crack + License Key Free for Windows PCMudasir
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON SUPPORT VECTOR MACHINE CLASSIFIER
1. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
DOI : 10.5121/ijma.2017.9101 1
A NOVEL IMAGE STEGANOGRAPHY APPROACH
USING MULTI-LAYERS DCT FEATURES BASED ON
SUPPORT VECTOR MACHINE CLASSIFIER
Akram AbdelQader1
and Fadel AlTamimi2
1
Department of Multimedia Systems, AL-Zaytoonah University Of Jordan, Amman,
Jordan
2
Department of Computer Science, AL-Zaytoonah University Of Jordan, Amman,
Jordan
ABSTRACT
Steganography is the science of hidden data in the cover image without any updating of the cover image.
The recent research of the steganography is significantly used to hide large amount of information within
an image and/or audio files. This paper proposed a new novel approach for hiding the data of secret image
using Discrete Cosine Transform (DCT) features based on linear Support Vector Machine (SVM)
classifier. The DCT features are used to decrease the image redundant information. Moreover, DCT is
used to embed the secrete message based on the least significant bits of the RGB. Each bit in the cover
image is changed only to the extent that is not seen by the eyes of human. The SVM used as a classifier to
speed up the hiding process via the DCT features. The proposed method is implemented and the results
show significant improvements. In addition, the performance analysis is calculated based on the
parameters MSE, PSNR, NC, processing time, capacity, and robustness.
KEYWORDS
Discrete Cosine Transform (DCT), Support Vector Machine (SVM), Classifier, Steganography, Peak
signal-to-noise ratio (PSNR).
1. INTRODUCTION
Recently, the growth of technology and social media communications over the internet motivate
the researchers to develop new steganography techniques. The objective of steganography is to
hide a secret message within a cover-media in such a way that others cannot discern the presence
of the hidden message. Today, steganography technology and steganalysis are attracted on much
attention. Steganalysis is focusing on the detection the present of hidden message. In the
literatures, many steganalytic research and schemes for digital images have been proposed [1]–
[3]. Recently, the security issues are very important research due to the wide amount of
information over the internet.
Steganography in the simple means hidden date in other, such as image, audio file or even a video
file [2]. An image is one type of steganographic, where the secret image is hidden in a cover
image based on some hiding algorithm. Form the state of the arte, many researchers use Least
Significant Bits (LSB) to reduce the distortion of the stegano image [22]. The original image used
2. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
2
to hide image is called a cover image in steganography, and the image to hide is called a secret
image [3].
The objective of steganography is hiding the data into the cover image such that the existence of
data in the cover image is not seen to the human beings [4]. The figure 1.1 shows the process of
hiding data.
Figure1. The process of hiding data
Many techniques were proposed to implement steganography such as Spatial-Domain methods
(LSB) where processing is applied directly on the pixel values of the image [22] and [23],
Transform Domain Methods (DCT) and Discrete Wavelet Transform (DWT) technique pixel
values are transformed and then processing is applied on the transformed coefficients, and
Statistical Methods [24] (Syndrome Trellis codes).
2. DISCRETE COSINE TRANSFORM (DCT)
Discrete Cosine Transform (DCT) techniques are used in frequency domain. The DCT is a
function that convert data from the spatial domain to the frequency domain. In DCT, after
converting the image in frequency domain, the data is hidden in the least significant bits of the
medium frequency components, secret messages are hidden in the high frequency coefficients
resulted from Discrete Wavelet Transform and provide maximum robustness. In the Least
Significant Bit (LSB), every pixel of an image is converting into the (1) or (0) and data is hidden
into the least significant position of the binary value of the pixels of the image.
DCTs are important to numerous applications in science and engineering, from lossy compression
of audio and images (where small high-frequency components can be discarded), to spectral
methods for the numerical solution of partial differential equations. The use of cosine functions is
critical in these applications: for compression, it turns out that cosine functions are much more
efficient (as described below, fewer functions are needed to approximate a typical signal),
whereas for differential equations the cosines express a particular choice of boundary conditions.
The most common variant of discrete cosine transform is the simply DCT, in addition to the
modified discrete cosine transforms (MDCT), which is based on a DCT of overlapping data.
[6][7]. Multidimensional variants of the various DCT types follow straightforwardly from the
one-dimensional definitions: they are simply a separable product (equivalently, a composition) of
DCTs along each dimension. Figure 2 shows a Discrete Cosine Transform of an Image.
3. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
3
Figure 2 Discrete Cosines Transform of an Image.
Where u= 0, 1, 2….. N-1
The general equation for a 2D (N by M image) DCT is defined by the following equation:
where u, v = 0,1,2….N-1
Here, the input image is of size N X M. c (i, j) is the value of the pixel in row i and column
j; C(u,v) is the DCT coefficient in row u and column v of the DCT matrix. DCT is used into
steganography as [8]. Image is segment into 8×8 blocks or 4X4 block of pixels. Working
from left to right, top to bottom, DCT is applied for each block. Each block is compressed
through quantization table to scale the DCT coefficients and message is hidden in DCT
coefficients. Figure 3 shows a two dimensional DCT frequencies from the RGB DCT image
of 8 X8 pixels.
Figure 3 Two-dimensional DCT frequencies from the RGB DCT image based on 8 X8 pixels
3. SUPPORT VECTOR MACHINE
Support vector machines (SVM) also support vector networks [25] are supervised learning
models with associated learning algorithms that analyses data used for classification and
regression analysis. Based on training example set, each marked as belonging to one of two
4. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
4
categories, since SVM builds a model that assigns new examples to one category or to the other.
In Linear SVM a training dataset of n points of the form as in the figure 4 below
where the yi are either 1 or −1, each indicating the class to which the point belongs. Each
is a p-dimensional real vector. We want to find the "maximum-margin hyperplane that divides the
group of points for which from the group of points for which , which is
defined so that the distance between the hyper-plane and the nearest point from either group
is maximized. Any hyperplane can be written as the set of points satisfying
where is the (not necessarily normalized) normal vector to the hyperplane. The
parameter determines the offset of the hyperplane from the origin along the normal vector .
Figure 4 Linear SVM classifier
4. THE LITERATURE REVIEW
Many researches were done on Steganography because it is very important in computer
multimedia fields, internet fields and in security systems. In addition, it is very important to know
how much data can be concealed without image distortion. In literature, the techniques of
steganography and its implementation were explained by J.R.Krenn in [1].
In [5], Chen Ming, et. al. focused on the steganography tools algorithms. Based on the analyses of
the algorithms, various tools are divided into five categories: (1). Spatial domain based
steganography tools; (2). Transform domain based steganography tools; (3). Document based
steganography tools; (4) File structure based Steganography tools; (5) other categories, e.g. video
compress encoding and spread spectrum technique based. Deshpande Neeta, et. al. [9], they
proposed the Least Significant Bit embedding technique suggests that data can be hidden in the
least significant bits (LSB) of the cover image and the human eye would be unable to see the
hidden data in the cover image. They explained the LSB embedding technique and presents the
evaluation results for 2, 4, 6 (LSB) for a PNG images and a .bmp images.
In [10] K.B.Raja, et. al., they proposed a challenging task of transferring the hidden data to the
cover without being detected. In addition, they used compression techniques on raw images to
5. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
enhance the security of the payload. Vijay Kumar Sharma,
steganography algorithm based on
operation to ensure the security against the steganalysis attack.
proposed a new steganography technique
and image quality, they embeds the secret messages in frequency domain
was divided into two modes and 5 cases. Ane
bitmap images with almost no perceptible difference between the original image and
image. Others in [14] they discusse
proposed a novel technique to hide data in a colorful image using least significant bit. Hassan
Mathkour,et. al. in [15] they
presented steganography techniques
that takes the advantages of the strengths and avoids the limitations
Finally, in [17] MamtaJuneja, et. al.
based on LSB and the RSA encryption t
5. THE PROPOSED APPROACH
In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm.
DCT2 is used as shown in the equation 1
Equation (1) DCT2 algorithm.
5.1 DCT FEATURES EXTRACTION
AND COVER IMAGES ALGORITHM
The proposed system has been designed to hide the secret message in the cover image
following algorithm shows the process of hidden a message:
The proposed algorithm 1 and methodology is shown in figure 5 and
following steps:
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
enhance the security of the payload. Vijay Kumar Sharma, et. al. [11] the proposed a
based on 8bit gray scale or 24bit color image, they used the
operation to ensure the security against the steganalysis attack. Other researchers in
proposed a new steganography technique based on different users demands on hiding capacity
embeds the secret messages in frequency domain the proposed algorithm
divided into two modes and 5 cases. Aneesh Jain, et. al. [13] they were hide the data in a
almost no perceptible difference between the original image and
discussed a survey of general steganography techniques and they
echnique to hide data in a colorful image using least significant bit. Hassan
in [15] they analyzed and evaluated the strengths and weaknesses of the
presented steganography techniques. In addition, they proposed a robust steganography technique
advantages of the strengths and avoids the limitations of the studied techniques
MamtaJuneja, et. al. they proposed a Robust image steganography technique
RSA encryption technique.
PPROACH
In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm.
DCT2 is used as shown in the equation 1.
XTRACTION AND SVM TRAINING PROCESS FOR THE
LGORITHM.
The proposed system has been designed to hide the secret message in the cover image
shows the process of hidden a message:
and methodology is shown in figure 5 and in our algorithm we use the
The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
5
the proposed a new
they used the logical
r researchers in [12] they
based on different users demands on hiding capacity
the proposed algorithm
they were hide the data in a
almost no perceptible difference between the original image and the result
techniques and they
echnique to hide data in a colorful image using least significant bit. Hassan
the strengths and weaknesses of the
robust steganography technique
of the studied techniques.
a Robust image steganography technique
In this paper we use the SVM classifier for training DCT Appling the linear SVM algorithm.
HE ORIGINAL
The proposed system has been designed to hide the secret message in the cover image, the
n our algorithm we use the
6. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
6
Figure 5 the proposed algorithm and methodology
The proposed algorithm and methodology are tested and the results are shown the following
figures. Figure 6 shows the cover original image with size 256 *256 which used to hide the
message. Figure 7 shows the original message that used to hide in the cover image of size of 64*
64. Figure 8 shows the stego image after hiding the secrete in the cover image.
7. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
7
Figure 8 Stego image size 256*256
The proposed algorithm is implemented and tested and shows a significant results. To show the
algorithm accuracy and performance many comparisons is done. The PSNR comparison is PSNR
44.3058 dB and the histogram between the original and stego images as shown in figure 9 and
figure 10.
Figure 10 Histogram of cover image and stego image
8. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
8
5.2 IDCT FEATURES EXTRACTION AND SVM TRAINING PROCESS FOR THE STEGO
IMAGE ALGORITHM.
The next step of the proposed algorithm is to extracting the secret image from the stego image as
shown in Algorithm 2 and in the methodology in figure 11.
Figure 10 the proposed algorithm to regenerate the secret image from the stego image
6. SYSTEM IMPLEMENTATION
This system was implemented using Matlab programming language over a PC Core i7 CPU with
8 GB RAM on Windows 7 Operating System. Many other applications were running such as
anti-virus application which may be effect the performance rate. The proposed system is tested
for many images width different sizes and different resolutions, and it shows significant results
based on DCT and SVM classifier. The proposed algorithm was tested for processes; the process
of hiding the secret message in the cover image and the process of retrieving the secret image
from the stego image and show good results.
The proposed system is implemented and tested using many images width different sizes and
different resolutions, and it shows significant results using the proposed three layer DCT methods
and SVM classifier.
9. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
9
Many experiments were done using the proposed algorithm and the results are analyzed
and reported. Table 1 shows the comparisons of PSNR between cover image and stego
image. In addition table 2 shows the comparisons of PSNR between secret and message
image.
Table 1 Result of PSNR between cover and stego image
Table 2 Result of PSNR between secret and message image
The tables 1 and 2 show a significant improvement results based on the ratio between the
maximum possible power of a signal and the power of corrupting noise that affects the fidelity of
the two compared images.
7. CONCLUSIONS
The proposed approach shows significant results based DCT features and the using of fast linear
SVM classifier that used in both processes (hiding and retrieving). Moreover, the using of the
three layer of a color image based on RGB over DCT features add significant improves in the
performance and the accuracy. The future work may be done by using other classifier and other
features and compare the results.
REFERENCES
[1] J.R. Krenn, “Steganography and Steganalysis”, January 2004.
[2] BeenishMehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427-
6/08/ 2008.
[3] M. M. Amin, M. Salleh, S. Ibrahim, M.R.Katmin, M.Z.I. Shamsuddin, “Information Hiding using
Steganography” Proceedings of 4th National Conference on Telecommunication Technology, Shah
Alam, Malaysia, 2003.
[4] K Suresh Babu, K B Raja, Kiran Kumar K, Manjula Devi T H, Venugopal K R, L M Patnaik,
“Authentication of Secret Information in Image Steganography”.
[5] Chen Ming, Zhang Ru, NiuXinxin, Yang Yixian, “Analysis of Current Steganography Tools:
Classifications & Features” , International Conference on Intelligent Information Hiding and
Multimedia Signal Processing (IIH-MSP'06),IEEE- 0-7695-2745-0/06 2006.
[6] Ahmed, N.; Natarajan, T.; Rao, K. R. (January 1974), "Discrete Cosine Transform", IEEE
Transactions on Computers C–23 (1): 90–93, doi:10.1109/T-C.1974.223784.
[7] Rao, K; Yip, P (1990), Discrete Cosine Transform: Algorithms, Advantages, Applications, Boston:
Academic Press, ISBN 0-12-580203-X
[8] NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine
Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications,
No.3 (17), 2008.
10. The International Journal of Multimedia & Its Applications (IJMA) Vol.9, No.1, February 2017
10
[9] Deshpande Neeta, KamalapurSnehal, Daisy Jacobs, “Implementation of LSB Steganography and Its
Evaluation for Various Bits”, 2004.
[10] K.B.Raja, C.R.Chowdary, Venugopal K R, L.M.Patnaik, “A Secure Image Steganography using LSB,
DCT and Compression Techniques on Raw Images”, IEEE-0-7803-9588-3/05 2005.
[11] Vijay KumarSharma, Vishalshrivastava, “A Steganography Algorithm for Hiding Images by
improved LSB substitution by minize detection.”Journal of Theoretical and Applied Information
Technology, Vol. 36 No.1, ISSN: 1992-8645, 15th February 2012.
[12] Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image Steganography”,International
Journal of Applied Science and Engineering 4, 3: 275-290, 2006.
[13] AneeshJain,IndranilSen. Gupta, “A JPEG Compression Resistant Steganography Scheme for Raster
Graphics Images”,IEEE-1-4244-1272-2/07 2007.
[14] BeenishMehboob and Rashid Aziz Faruqui, “A Steganography Implementation”, IEEE -4244-2427-
6/08 2008.
[15] Hassan Mathkour, Batool Al-Sadoon, AmeurTouir, “A New Image Steganography Technique”,IEEE-
978-1-4244-2108-4/08 2008.
[16] NageswaraRaoThota, Srinivasa Kumar Devireddy, “Image Compression Using Discrete Cosine
Transform”, Georgian Electronic Scientific Journal: Computer Science and Telecommunications,
No.3 (17), 2008.
[17] MamtaJuneja,Parvinder Singh Sandhu, “Designing of Robust Image Steganography Technique Based
on LSB Insertion and Encryption”, International Conference on Advances in Recent Technologies in
Communication and Computing, 2009.
[18] Vijay Kumar, Dinesh Kumar, “Performance Evaluation of DWT Based Image Steganography”
,IEEE- 978-1-4244-4791-6/10 2010.
[19] Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity Image Steganography Technique
Based on Wavelet Transform” The International Arab Journal of Information Technology, Vol. 7, No.
4, October 2010.
[20] T. Narasimmalou, Allen Joseph .R, “Optimized Discrete Wavelet Transform based Steganography” ,
IEEE International Conference on Advanced Communication Control and Computing Technologies
(ICACCCT),2012.
[21] NedaRaftari and Amir MasoudEftekhariMoghadam, “Digital Image Steganography Based on
Assignment Algorithm and Combination of DCT-IWT”, Fourth International Conference on
Computational Intelligence, Communication Systems and Networks, 2012.
[22] S. M. Mohadeseh, N. Hossein, "The pair-wise LSB matching steganography with a discrete quantum
behaved Gravitational Search Algorithm", Journal of Intelligent & Fuzzy Systems, vol. 30, no. 3, pp.
1547-1556, 2016.
[23] Mamta Juneja and Parvinder Singh Sandhu, “A New Approach for Information security using an
Improved Steganography Technique”, Journal of Info.Pro.Systems, Vol 9, No:3, pp.405-424, (2013) .
[24] Tomas Filler, Student Member, IEEE, Jan Judas and Jessica Fridrich, Member, IEEE, (2010)
“Minimizing Additive Distortion in Steganography using Syndrome Trellis Codes”, IEEE Article,
pp.1-17.
[25] Cortes, C.; Vapnik, V. "Support-vector networks". Machine Learning. 20 (3): 273–297.
doi:10.1007/BF00994018, (1995).