SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Downloaden Sie, um offline zu lesen
International Journal of Engineering Research and Development
eISSN : 2278-067X, pISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 3 (July 2012), PP. 01-07

         Multimedia Data Compression by Dynamic Dictationary
                 Approach with Stegnography Facility
                    1
                        Kanindra Shrivastava, 2 Vinay Jain, 3 Mohan Awasthi
                                         1,2,3
                                                 Dept. of E&TC, SSCET BHILAI, India



Abstract––This paper presents a proposal for communication which is major part of daily life of today.We are living an
age of science. . With the increasing communication traffic demand, data security has become very important field. Lots
of data security and data hiding algorithms have been developed in the last decade. we are implementing a method of
“Digital Stenography” for image data hiding. Image Steganography system allows an average user to securely transfer
text messages by hiding them in a digital image file. A combination of Steganography and encryption algorithms provides
a strong backbone for its security. Digital Image Steganography system features innovative techniques for hiding text in a
digital image file or even using it as a key to the encryption.

                                                 I.       INTRODUTION
           The word steganography is of Greek origin and means "covered, or hidden writing". Steganography is the art and
science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes
there is a hidden message. Generally, a steganographic message will appear to be something else: a picture, an article, a
shopping list, or some other message. A steganographic message (the plaintext) is often first encrypted by some traditional
means, producing a cipher text. image steganography system is a stand-alone application that combines steganography and
encryption to enhance the confidentiality of intended message. The user’s intended message is first encrypted to create
unintelligible cipher text. Then the cipher text will be hidden within an image file in such a way as to minimize the perceived
loss in quality. The recipient of the image is able to retrieve the hidden message back from the image with this system.

           The JPEG format is currently the most common format for storing image data. It is also supported by virtually all
software applications that allow viewing and working with digital images Recently, several steganographic techniques for data
hiding in JPEGs have been developed .

                         II.          IMAGE STEGANOGRAPGY ALGORITHM
           The OutGuess steganographic algorithm was proposed to counter the statistical chi-square attack . In the first pass,
similar to J-Steg, OutGuess embeds message bits along a random walk into the LSBs of coefficients while skipping 0’s and
1’s. After embedding, the image is processed again using a second pass. This time, corrections are made to the coefficients to
make the stego image histogram match the cover image histogram. Because the chi-square attack is based on analyzing first-
order statistics of the stego image, it cannot detect messages embedded using OutGuess. Provos also reports that the
corrections are made in such a manner to avoid detection using his generalized chi-square attack .

           In our attack on OutGuess, we use the fact that the embedding mechanism in OutGuess is overwriting the LSBs.
This means that embedding another message into the stego image will partially cancel out and will thus have a different
effect on the stego image than on the cover image.

Outguess
Proposed by Neils Provos in 2001 as a response to the ststistical chi –square attact by Andreas Westfeldin 1999.

Main feature of outguess
   1. outguess hides messages in JPEG files
   2. It embeds hides messages in bits in LSBs of quantized

DCT coefficients along a key –dependent walk through the image.
   a) Outguess Preserves the histogram of DCT coefficients exactly.
   b) Outguess cannot be detected using the chi –square attack or its generalized versions.
   c) Embed secret information in DCT domain.
   d) Modifies LSBs of DCT coefficients at random locations.
   e) Corrects statistical deviation by modifying unused LSBs.
   f) Distribution of DCT coefficients is preserved after embedding process.
   g) An a priori embedding capacity for an image can be determined




                                                               1
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility




                                             Fig 1 Block diagram of Algorithm

                    III.           JPEG STEGANOGRAPHY AND ALGORITHMS
3.1 JPEG Format
          Strictly speaking, JPEG refers only to a family of compression algorithms; it does not refer to a specific image file
format. The JPEG committee was prevented from defining a file format by turf wars within the international standards
organizations. JFIF has emerged as the de-facto standard on Internet, and is what is most commonly meant by "a JPEG file.
JPEG works by extracting coefficients describing 8x8 pixel blocks and then compressing these coefficients. The blocks can
be revealed by saving a JPEG of a gradient pattern with the lowest possible compression quality. The blocks, which start in
the upper left-hand corner, are shown in Fig. Partial blocks will be included on the right and lower edges if the dimensions
are not divisible by 8 pixels




                                        Left: gradient with high quality compression
                                        Right: gradient with low quality compression
                                                            Fig 2




                                                              2
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility

                              IV.           ALGORITHM FOR ENCODING
    1)   The input is a Buffered Image object, which contains a Color Model and a matrix representing the image with
         pointers aimed at indices of the Color Model. The RGB values of the uncompressed input image are converted into
         three components: one luminance component and two chrominance components (YUV). The luminance
         component is considered more important.
    2)   The image is separated into 8x8 pixel blocks starting from the upper left-hand corner.
    3)   The component signals for each 8x8 block are transformed into the frequency domain by using the two-
         dimensional discrete cosine transform (DCT). This transformation is similar to the two-dimensional fast Fourier
         transformation.
    4)   While the coefficients closest to 0 are eliminated, the remaining coefficients are quantized using various degrees of
         accuracy. This can be modified by changing the quantization tables. The DC luminance coefficients are the most
         important and are quantized with the most accuracy.
    5)   Since the DC luminance coefficients are quantized with the most accuracy, we will hide the information inside
         them
    6)   Finally, the quantized coefficients are compressed using a Huffman encoder

                               V.           ALGORITHM FOR DECODING
          The decoding scheme is much simpler than encoding. The averages of the luminance of the 8x8 blocks just need to
be calculated and converted back to bits.

Basically what we exactly do in decoding process is:-
    1) The user needs to provide a Source Image and any Keys used when the Source Image was generated.
    2) If a non-default key was used in text hiding process, the receiving party must have prearranged knowledge of the
          key for use in retrieving the text.
    3) After the Source Image and any required Keys are loaded into the application, the hidden text can be retrieved by
          selecting Extract Text from the Tools menu




                      The generic process of Encoding and Decoding is demonstrated in this diagram
                                                         Fig 5

                                      VI.           SYSTEM ANALYSIS
6.1 System Analysis Methodology
          The methodology used for System Analysis is the Object Oriented Analysis. The OOA process begins with an
understanding of a manner in which the system is used by people. Once the scenario of usage is defined, the modeling of the
software begins.

         Use Cases model the system from the end user’s point of view. The use case diagram for our system is as follows
The use case achieves the following objectives:
    a) Define the functional and operational requirements of the system by define a scenario of usage that is agreed upon
         by the end user and the software engineering team.
    b) Provide a clear view of the system’s functionality.




                                                             3
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility




                                                Fig. 6 Use Case Diagram

6.2 User Interface
User interface consist of three main panels are Main Panel, Key Panel, & Source/Target Panel.

Main Panel: The main panel of the application contains a Text tab and an Image tab as described below. Both the text and
image cannot be viewed at the same time in the main panel; however, a scaled version of the image is always shown in the
Source/Target pane, so both will be visible if the text tab for the main panel is selected.
    i) Text Tab: This is the main text area into which the user types the text to be hidden within an image. In the case of
         extracting text from an image, the text would be loaded into this same tab.
    ii) Image Tab: This tab is also located within the main panel. Its sole purpose is to display an image that has been
         produced as a result of embedding text within another image.

Key Panel: The Key Panel will have a text key tabs that will display the selected key. The selected key will be the key the
program uses.
     i) Text tab: The user may type directly into the text tab. He can also use Open Text Key from the Tools menu to load
          text as a key. The text continues to be editable once a text file has been loaded.

Source/Target Panel: The Source/Target Panel shows the image that will contain hidden text, or an image, which we would
like to extract text from. An image can be loaded into the Source/Target Pane either from the Image Bar via the Load Image
button that will load highlighted image or through File menu ‡ Open Image File.

6.3 Activity Diagram
          An activity diagram is essentially a flowchart, showing flow of control from activity to activit y. It is used to
model the dynamic aspects of the system. An activity is an ongoing execution in the system. Activities ultimately result in
actions, which is made up of executable atomic computations that result in a change in state of the system or retur n of a
value.




                                                            4
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility




                        Fig. 7 Activity Diagram for embedding




                        Fig. 8 Activity Diagram for Extracting




                                          5
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility

6.4 Input/Output Screens
 .




                                                       Fig.9 Login Screen




                                                        Fig.10 Main Panel

                                            VII.            CONCLUSION
          The application is primarily intended to be used to inconspicuously hide confidential and proprietary information
by anyone seeking to hide information. This software has an advantage over other information security systems because the
hidden text are in the form of image, which is not obvious text information carriers.

          Because of its user-friendly interface, the application can also be used by anyone who wants to securely transmit
private information. The main advantage of this program for individuals is that they do not have to have any knowledge
about steganography or encryption. The visual way to encode the text, plus the visual key makes it easy for average users to
navigate within the program. To send a message, a source text, an image in which the text should be embedded, and a key
are needed. The key is used to aid in encryption and to decide where the information should be hidden in the image. A short
text can be used as a key. To receive a message, a source image containing the information and the corresponding key are
both required. The result will appear in the text tab after decoding.

          The common Internet-friendly format is offered. It is inherently more difficult to hide information in a JPEG image
because that is exactly what the designers of JPEG wanted to avoid: the transmission of extra information that doesn't a ffect
the appearance of the image.

                                                       REFERENCES
[1].      Daniel L.Lau, Robert Ulichney, Gonzalo R.Arce, “Fundamental Characteristics of Halftone Textures: Blue-Noise and Green-
          Noise”, Image Systems Laboratory, HP Laboratories Cambridge, March 2003.
[2].      C.Yang and C.Laih, “New colored visual secret sharing schemes”, Designs, Codes and Cryptography, vol.20, 2000, pp.325-335.
[3].      C.Chang, C.Tsai, and T.Chen, “A new scheme for sharing secret color images in computer network”, in Proc. of International
          Conference on Parallel and Distributed Systems, 2000, pp. 21-27.
[4].      R.L.Alder, B.P.Kitchens, M.Martens, “The mathematics of halftoning”, IBM J. Res. & Dev. Vol.47 No.1, Jan. 2003, pp. 5 -15.
[5].      R.Lukac, K.N.Plantaniotis, B.Smolka, “A new approach to color image secret sharing”, EUSIPCO 2004, pp.1493-1496.
[6].      H.Ancin, Anoop K.Bhattacharjya, Joseph Shu, “Improving void-and-cluster for better halftone uniformity”,International
          Conference on Digital Printing Technoogies.
[7].      N . Provos, “Defending Against Statistical Steganography,” Proc 10th USENEX Security Symposium 2005.
                                                                 6
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility
 [8].   N . Provos and P. Honeyman, “Hide and Seek: An introduction to Steganography,” IEEE Security & Privacy Journal 2003.
 [9].   S . Katzenbeisser and Petitcolas , ”Information Hiding Techniques for Stenography and Digital watermaking” Artech House,
        Norwood, MA. 2000 .
[10].   L. Reyzen And S. Russell , “More efficient provably secure Steganography” 2007.
[11].   S.Lyu and H. Farid , “Steganography using higher order image statistics , “ IEEE Trans. Inf. Forens. Secur. 2006
[12].   Venkatraman , s, Abraham , A . & Paprzycki M.” Significance of Steganography on Data Security “ , Proceedings of the
        International Conference on Information Technology : Coding and computing , 2004.
[13].   Fridrich , J ., Goljan M., and Hogea , D ; New Methodology for Breaking stenographic Techniques for JPEGs. “ Electronic
        Imaging 2003”.
[14].   http:/ aakash.ece.ucsb.edu./ data hiding / stegdemo.aspx.Ucsb data hiding online demonstration . Released on Mar .09,2005.




                                                                 7

Weitere ähnliche Inhalte

Was ist angesagt?

A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONsipij
 
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...iosrjce
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419IJRAT
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Object Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet TransformObject Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet TransformIJCOAiir
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...IJERA Editor
 
Wavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsWavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsIJERA Editor
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueCSCJournals
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueEditor IJCATR
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystManish Myst
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA IOSR Journals
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Matlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various AlgorithmMatlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various Algorithmijtsrd
 

Was ist angesagt? (19)

A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
 
M017427985
M017427985M017427985
M017427985
 
O017429398
O017429398O017429398
O017429398
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
akashreport
akashreportakashreport
akashreport
 
Object Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet TransformObject Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet Transform
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
 
Wavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsWavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methods
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Matlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various AlgorithmMatlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various Algorithm
 

Andere mochten auch

Co robić jeśli biuro podróży upadnie - poradnik
Co robić jeśli biuro podróży upadnie - poradnikCo robić jeśli biuro podróży upadnie - poradnik
Co robić jeśli biuro podróży upadnie - poradnikTripsta
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
GT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, USGT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, USGrant Thornton
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Bachlelordiploma_withoutsupplements
Bachlelordiploma_withoutsupplementsBachlelordiploma_withoutsupplements
Bachlelordiploma_withoutsupplementsDenise Richter
 
Peace is the ground beneath all struggle.
Peace is the ground beneath all struggle.Peace is the ground beneath all struggle.
Peace is the ground beneath all struggle.Rhea Myers
 
Alfarising brochure 2012
Alfarising brochure 2012Alfarising brochure 2012
Alfarising brochure 2012Brian Nam
 

Andere mochten auch (8)

Co robić jeśli biuro podróży upadnie - poradnik
Co robić jeśli biuro podróży upadnie - poradnikCo robić jeśli biuro podróży upadnie - poradnik
Co robić jeśli biuro podróży upadnie - poradnik
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
GT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, USGT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, US
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Bachlelordiploma_withoutsupplements
Bachlelordiploma_withoutsupplementsBachlelordiploma_withoutsupplements
Bachlelordiploma_withoutsupplements
 
Peace is the ground beneath all struggle.
Peace is the ground beneath all struggle.Peace is the ground beneath all struggle.
Peace is the ground beneath all struggle.
 
Alfarising brochure 2012
Alfarising brochure 2012Alfarising brochure 2012
Alfarising brochure 2012
 

Ähnlich wie IJERD (www.ijerd.com) International Journal of Engineering Research and Development hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper, journal

DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques IJECEIAES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyIRJET Journal
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesIJERA Editor
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey ijsc
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniquessipij
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyAM Publications,India
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )ijsc
 

Ähnlich wie IJERD (www.ijerd.com) International Journal of Engineering Research and Development hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper, journal (20)

DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
G017444651
G017444651G017444651
G017444651
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniques
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 

Mehr von IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

Mehr von IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Kürzlich hochgeladen

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Kürzlich hochgeladen (20)

Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper, journal

  • 1. International Journal of Engineering Research and Development eISSN : 2278-067X, pISSN : 2278-800X, www.ijerd.com Volume 2, Issue 3 (July 2012), PP. 01-07 Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility 1 Kanindra Shrivastava, 2 Vinay Jain, 3 Mohan Awasthi 1,2,3 Dept. of E&TC, SSCET BHILAI, India Abstract––This paper presents a proposal for communication which is major part of daily life of today.We are living an age of science. . With the increasing communication traffic demand, data security has become very important field. Lots of data security and data hiding algorithms have been developed in the last decade. we are implementing a method of “Digital Stenography” for image data hiding. Image Steganography system allows an average user to securely transfer text messages by hiding them in a digital image file. A combination of Steganography and encryption algorithms provides a strong backbone for its security. Digital Image Steganography system features innovative techniques for hiding text in a digital image file or even using it as a key to the encryption. I. INTRODUTION The word steganography is of Greek origin and means "covered, or hidden writing". Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. A steganographic message (the plaintext) is often first encrypted by some traditional means, producing a cipher text. image steganography system is a stand-alone application that combines steganography and encryption to enhance the confidentiality of intended message. The user’s intended message is first encrypted to create unintelligible cipher text. Then the cipher text will be hidden within an image file in such a way as to minimize the perceived loss in quality. The recipient of the image is able to retrieve the hidden message back from the image with this system. The JPEG format is currently the most common format for storing image data. It is also supported by virtually all software applications that allow viewing and working with digital images Recently, several steganographic techniques for data hiding in JPEGs have been developed . II. IMAGE STEGANOGRAPGY ALGORITHM The OutGuess steganographic algorithm was proposed to counter the statistical chi-square attack . In the first pass, similar to J-Steg, OutGuess embeds message bits along a random walk into the LSBs of coefficients while skipping 0’s and 1’s. After embedding, the image is processed again using a second pass. This time, corrections are made to the coefficients to make the stego image histogram match the cover image histogram. Because the chi-square attack is based on analyzing first- order statistics of the stego image, it cannot detect messages embedded using OutGuess. Provos also reports that the corrections are made in such a manner to avoid detection using his generalized chi-square attack . In our attack on OutGuess, we use the fact that the embedding mechanism in OutGuess is overwriting the LSBs. This means that embedding another message into the stego image will partially cancel out and will thus have a different effect on the stego image than on the cover image. Outguess Proposed by Neils Provos in 2001 as a response to the ststistical chi –square attact by Andreas Westfeldin 1999. Main feature of outguess 1. outguess hides messages in JPEG files 2. It embeds hides messages in bits in LSBs of quantized DCT coefficients along a key –dependent walk through the image. a) Outguess Preserves the histogram of DCT coefficients exactly. b) Outguess cannot be detected using the chi –square attack or its generalized versions. c) Embed secret information in DCT domain. d) Modifies LSBs of DCT coefficients at random locations. e) Corrects statistical deviation by modifying unused LSBs. f) Distribution of DCT coefficients is preserved after embedding process. g) An a priori embedding capacity for an image can be determined 1
  • 2. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility Fig 1 Block diagram of Algorithm III. JPEG STEGANOGRAPHY AND ALGORITHMS 3.1 JPEG Format Strictly speaking, JPEG refers only to a family of compression algorithms; it does not refer to a specific image file format. The JPEG committee was prevented from defining a file format by turf wars within the international standards organizations. JFIF has emerged as the de-facto standard on Internet, and is what is most commonly meant by "a JPEG file. JPEG works by extracting coefficients describing 8x8 pixel blocks and then compressing these coefficients. The blocks can be revealed by saving a JPEG of a gradient pattern with the lowest possible compression quality. The blocks, which start in the upper left-hand corner, are shown in Fig. Partial blocks will be included on the right and lower edges if the dimensions are not divisible by 8 pixels Left: gradient with high quality compression Right: gradient with low quality compression Fig 2 2
  • 3. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility IV. ALGORITHM FOR ENCODING 1) The input is a Buffered Image object, which contains a Color Model and a matrix representing the image with pointers aimed at indices of the Color Model. The RGB values of the uncompressed input image are converted into three components: one luminance component and two chrominance components (YUV). The luminance component is considered more important. 2) The image is separated into 8x8 pixel blocks starting from the upper left-hand corner. 3) The component signals for each 8x8 block are transformed into the frequency domain by using the two- dimensional discrete cosine transform (DCT). This transformation is similar to the two-dimensional fast Fourier transformation. 4) While the coefficients closest to 0 are eliminated, the remaining coefficients are quantized using various degrees of accuracy. This can be modified by changing the quantization tables. The DC luminance coefficients are the most important and are quantized with the most accuracy. 5) Since the DC luminance coefficients are quantized with the most accuracy, we will hide the information inside them 6) Finally, the quantized coefficients are compressed using a Huffman encoder V. ALGORITHM FOR DECODING The decoding scheme is much simpler than encoding. The averages of the luminance of the 8x8 blocks just need to be calculated and converted back to bits. Basically what we exactly do in decoding process is:- 1) The user needs to provide a Source Image and any Keys used when the Source Image was generated. 2) If a non-default key was used in text hiding process, the receiving party must have prearranged knowledge of the key for use in retrieving the text. 3) After the Source Image and any required Keys are loaded into the application, the hidden text can be retrieved by selecting Extract Text from the Tools menu The generic process of Encoding and Decoding is demonstrated in this diagram Fig 5 VI. SYSTEM ANALYSIS 6.1 System Analysis Methodology The methodology used for System Analysis is the Object Oriented Analysis. The OOA process begins with an understanding of a manner in which the system is used by people. Once the scenario of usage is defined, the modeling of the software begins. Use Cases model the system from the end user’s point of view. The use case diagram for our system is as follows The use case achieves the following objectives: a) Define the functional and operational requirements of the system by define a scenario of usage that is agreed upon by the end user and the software engineering team. b) Provide a clear view of the system’s functionality. 3
  • 4. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility Fig. 6 Use Case Diagram 6.2 User Interface User interface consist of three main panels are Main Panel, Key Panel, & Source/Target Panel. Main Panel: The main panel of the application contains a Text tab and an Image tab as described below. Both the text and image cannot be viewed at the same time in the main panel; however, a scaled version of the image is always shown in the Source/Target pane, so both will be visible if the text tab for the main panel is selected. i) Text Tab: This is the main text area into which the user types the text to be hidden within an image. In the case of extracting text from an image, the text would be loaded into this same tab. ii) Image Tab: This tab is also located within the main panel. Its sole purpose is to display an image that has been produced as a result of embedding text within another image. Key Panel: The Key Panel will have a text key tabs that will display the selected key. The selected key will be the key the program uses. i) Text tab: The user may type directly into the text tab. He can also use Open Text Key from the Tools menu to load text as a key. The text continues to be editable once a text file has been loaded. Source/Target Panel: The Source/Target Panel shows the image that will contain hidden text, or an image, which we would like to extract text from. An image can be loaded into the Source/Target Pane either from the Image Bar via the Load Image button that will load highlighted image or through File menu ‡ Open Image File. 6.3 Activity Diagram An activity diagram is essentially a flowchart, showing flow of control from activity to activit y. It is used to model the dynamic aspects of the system. An activity is an ongoing execution in the system. Activities ultimately result in actions, which is made up of executable atomic computations that result in a change in state of the system or retur n of a value. 4
  • 5. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility Fig. 7 Activity Diagram for embedding Fig. 8 Activity Diagram for Extracting 5
  • 6. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility 6.4 Input/Output Screens . Fig.9 Login Screen Fig.10 Main Panel VII. CONCLUSION The application is primarily intended to be used to inconspicuously hide confidential and proprietary information by anyone seeking to hide information. This software has an advantage over other information security systems because the hidden text are in the form of image, which is not obvious text information carriers. Because of its user-friendly interface, the application can also be used by anyone who wants to securely transmit private information. The main advantage of this program for individuals is that they do not have to have any knowledge about steganography or encryption. The visual way to encode the text, plus the visual key makes it easy for average users to navigate within the program. To send a message, a source text, an image in which the text should be embedded, and a key are needed. The key is used to aid in encryption and to decide where the information should be hidden in the image. A short text can be used as a key. To receive a message, a source image containing the information and the corresponding key are both required. The result will appear in the text tab after decoding. The common Internet-friendly format is offered. It is inherently more difficult to hide information in a JPEG image because that is exactly what the designers of JPEG wanted to avoid: the transmission of extra information that doesn't a ffect the appearance of the image. REFERENCES [1]. Daniel L.Lau, Robert Ulichney, Gonzalo R.Arce, “Fundamental Characteristics of Halftone Textures: Blue-Noise and Green- Noise”, Image Systems Laboratory, HP Laboratories Cambridge, March 2003. [2]. C.Yang and C.Laih, “New colored visual secret sharing schemes”, Designs, Codes and Cryptography, vol.20, 2000, pp.325-335. [3]. C.Chang, C.Tsai, and T.Chen, “A new scheme for sharing secret color images in computer network”, in Proc. of International Conference on Parallel and Distributed Systems, 2000, pp. 21-27. [4]. R.L.Alder, B.P.Kitchens, M.Martens, “The mathematics of halftoning”, IBM J. Res. & Dev. Vol.47 No.1, Jan. 2003, pp. 5 -15. [5]. R.Lukac, K.N.Plantaniotis, B.Smolka, “A new approach to color image secret sharing”, EUSIPCO 2004, pp.1493-1496. [6]. H.Ancin, Anoop K.Bhattacharjya, Joseph Shu, “Improving void-and-cluster for better halftone uniformity”,International Conference on Digital Printing Technoogies. [7]. N . Provos, “Defending Against Statistical Steganography,” Proc 10th USENEX Security Symposium 2005. 6
  • 7. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility [8]. N . Provos and P. Honeyman, “Hide and Seek: An introduction to Steganography,” IEEE Security & Privacy Journal 2003. [9]. S . Katzenbeisser and Petitcolas , ”Information Hiding Techniques for Stenography and Digital watermaking” Artech House, Norwood, MA. 2000 . [10]. L. Reyzen And S. Russell , “More efficient provably secure Steganography” 2007. [11]. S.Lyu and H. Farid , “Steganography using higher order image statistics , “ IEEE Trans. Inf. Forens. Secur. 2006 [12]. Venkatraman , s, Abraham , A . & Paprzycki M.” Significance of Steganography on Data Security “ , Proceedings of the International Conference on Information Technology : Coding and computing , 2004. [13]. Fridrich , J ., Goljan M., and Hogea , D ; New Methodology for Breaking stenographic Techniques for JPEGs. “ Electronic Imaging 2003”. [14]. http:/ aakash.ece.ucsb.edu./ data hiding / stegdemo.aspx.Ucsb data hiding online demonstration . Released on Mar .09,2005. 7