Design of Imprecise Multipliers by Using Approximate Technique for Error Resilient Applications

Author(s):  
M. Priyadharshni ◽  
S. Kumaravel

Approximate computing is the perfect way for error resilient applications with progress in speed and power but tradeoff with computational accuracy. In this paper, Imprecise Multipliers (IMs) are realized by segregating the partial products into two segments. The most significant bit (MSB) segment is accumulated as per Dadda tree structure and the least significant bit (LSB) segment is accumulated by approximate technique. The proposed Imprecise Multipliers, namely [Formula: see text] and [Formula: see text] are realized using Verilog HDL and simulated using TSMC 65[Formula: see text]nm process. For sake of comparison, the proposed multipliers [Formula: see text] and [Formula: see text] are compared with existing approximate multipliers. From the reported results, it may be noted that [Formula: see text] performs better in terms of area–delay product, power–delay product. While [Formula: see text] achieves a higher peak signal-to-noise ratio (PSNR) among all the multipliers existing in the literature.

2019 ◽  
Vol 5 (3) ◽  
pp. 255
Author(s):  
Garno Garno ◽  
Riza Ibnu Adam

Maraknya kasus pencurian data menyebabkan sistem keamanan pesan harus ditingkatkan. Salah satu cara untuk mengamankan pesan adalah dengan memasukkan pesan ke dalam gambar digital. Penelitian ini bertujuan untuk meningkatkan kualitas gambar digital dalam sistem keamanan pesan tersembunyi. Teknik yang digunakan untuk keamanan pesan adalah steganografi. Cover image akan dikonversi menjadi bit piksel dalam domain spasial. Cover image digunakan dalam bentuk gambar digital dengan format .jpg. Teknik meningkatkan kualitas dan kapasitas gambar digital dilakukan dengan menambahkan dan meningkatkan bit piksel menggunakan metode interpolasi Cubik B-Spline. Cover image yang telah di interpolasi, kemudian disisipi pesan menggunakan metode least significant bit (LSB) untuk memperoleh stegoimage. Pesan yang diselipkan berbentuk file .doc, .docx, .pdf, .xls, .rar, .iso dan .zip dengan ukuran berbeda-beda kapasitasnya. Teknik uji dibuat dengan bantuan perangkat lunak MATLAB versi 2017a. Penelitian melakukan uji dengan mengukur nilai kualitas penyamaran dari stegoimage menggunakan Peak Signal to Noise Ratio (PSNR) dengan rata-rata perolehan stegoimage terhadap Original image 29.06 dB dan stegoimage terhadap Image interpolation 64.34 dB dan uji mean squared error (MSE) dengan rata-rata perolehan 97.54 dB pada Image interpolation terhadap original image dan 97.55 dB pada stegoimage terhadap original image, 0.13 dB nilai MSE stegoimage terhadap Image interpolation. Hasil uji pada penelitian dengan proses interpolasi pada coverimage dengan Cubic B-Spline mempengaruhi terhadap nilai samar atau Nilai PSNR.


2021 ◽  
Vol 13 (1) ◽  
pp. 67-77
Author(s):  
Guntoro Barovih ◽  
Fadhila Tangguh Admojo ◽  
Yoda Hersaputra

A message is a form of conveying information. Various ways are used to secure the information conveyed in the form of messages either in encrypted form or in the form of applying a password in the message. Messages can also be encrypted and embedded in other media such as images (steganography). This research aimed to insert a message into the form of an image by combining the Modified Least Significant Bit (MLSB) method in encrypting messages and reshape modification technique to determine at which position the message encryption will be embedded in the image. Tests were carried out to obtain the quality of the encryption process using the parameters of Fidelity, mean square error, peak signal to noise ratio, testing on file type, robustness, and comparison of message contents. The results of the tests showed that the files that can be used are files with the image file type in the lossless compression category, the rotation can be done at 90, 180, 270 without destroying the message in it, and changing the pixel in the image file will destroy the message inside


Author(s):  
S. R. Heister ◽  
V. V. Kirichenko

Introduction. The digital representation of received radar signals has provided a wide range of opportunities for their processing. However, the used hardware and software impose some limits on the number of bits and sampling rate of the signal at all conversion and processing stages. These limitations lead to a decrease in the signal-to-interference ratio due to quantization noise introduced by powerful components comprising the received signal (interfering reflections; active noise interference), as well as the attenuation of a low-power reflected signal represented by a limited number of bits. In practice, the amplitude of interfering reflections can exceed that of the signal reflected from the target by a factor of thousands.Aim. In this connection, it is essential to take into account the effect of quantization noise on the signal-tointerference ratio.Materials and methods. The article presents expressions for calculating the power and power spectral density (PSD) of quantization noise, which take into account the value of the least significant bit of an analog-to-digital converter (ADC) and the signal sampling rate. These expressions are verified by simulating 4-, 8- and 16-bit ADCs in the Mathcad environment.Results. Expressions are derived for calculating the quantization noise PSD of interfering reflections, which allows the PSD to be taken into account in the signal-to-interference ratio at the output of the processing chain. In addition, a comparison of decimation options (by discarding and averaging samples) is performed drawing on the estimates of the noise PSD and the signal-to-noise ratio.Conclusion. Recommendations regarding the ADC bit depth and sampling rate for the radar receiver are presented.


2020 ◽  
Vol 4 (3) ◽  
pp. 454-461
Author(s):  
Hermansa ◽  
Rusydi Umar ◽  
Anton Yudhana

Message security is very important now. Because security is part of the privacy of someone who wants to protect messages from those who do not have the right to read or receive them. The method used for securing information messages with message encryption and decryption techniques is the Playfair Cipher algorithm combined with the Least Significant Bit (LSB) method. In this study it was found that the Playfair Cipher algorithm is quite safe in implementing cryptographic encryption or ciphertext because the playfair cipher has a level of appearance of letters that is so difficult to predict so that the ciphertext becomes a randomized collection of data. For the Least Significant Bit (LSB) steganography method in the insertion of a secret or embedded message it is difficult to guess in plain view the changes that occur between before and after the image is inserted are not too significant. Also see the value of the Peak-Signal-to-Noise ratio or PSNR can still be considered good quality due to> 30 decibels (dB). So the final result of the combination of the Playfair Cipher algorithm with the Least Significant Bit (LSB) method is quite good in securing messages.


2019 ◽  
Vol 16 (11) ◽  
pp. 4812-4825
Author(s):  
Mohsin N. Srayyih Almaliki

One of the crucial aspects of processes and methodologies in the information and communication technology era is the security of information. The security of information should be a key priority in the secret exchange of information between two parties. In order to ensure the security of information, there are some strategies which are used, and they include steganography and cryptography. With cryptography, the secret message is converted into unintelligible text, but the existence of the secret message is noticed, nonetheless, steganography involves hiding the secret message in a way that its presence cannot be noticed. In this paper, a new secure image steganography framework which is known as an adaptive stego key LSB (ASK-LSB) framework is proposed. The construction of the proposed framework was carried out in four phases with the aim of improving the data-hiding algorithm in cover images by using capacity, image quality, and security. To achieve this, the Peak Signal-to-Noise Ratio (PSNR) of the steganography framework was maintained. The four phases began with the image preparation phase, followed by the secret message preparation phase, embedding phase and finally extraction phase. The secure image steganography framework that is proposed in this study is based on a new adaptive of least significant bit substitution method, combination random function, and encryption method. In the proposed work, the secret bits are inserted directly or inversely, thereby enhancing the imperceptibility and complexity of the process of embedding. Results from the experiment reveal that the algorithm has better image quality index, peak signal-to-noise ratio, and payload used in the evaluation of the stego image.


2018 ◽  
Vol 7 (2.5) ◽  
pp. 119
Author(s):  
Erick Fitra Wijayanto ◽  
Muhammad Zarlis ◽  
Zakarias Situmorang

There are many research has done a hybridization approach of text message insertion that has been compressed with Lempel-Ziv-Welch (LZW) algorithm and has also been encrypted. The text messages in ciphertext form are inserted into the image file using LSB (Least Significant Bit) method. The results of this study indicate that the value of Peak Signal to Noise Ratio (PSNR) lower than the LSB method of 0.94 times with a ratio of 20.33%, with Kekre's method of 10.04%. To improve the value of PSNR stego image of insertion, in this research is inserted audio samples using 5 bits to reduce the amount of data insertion, so it can get the value of MSE stego image low. Prior to insertion, the text file is compressed with the Lempel-Ziv-Welch (LZW) algorithm and encrypted with the Advanced Encryption Standard (AES) algorithm. Then, the insertion of compression and encrypted text files is done with the Modified Least Significant Bit (MLSB) algorithm. To performa test reliability of steganography, the image stego image is done by calculating Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). At extraction process with MLSB algorithm, decryption with AES algorithm and decompression with LZW algorithm. The experimental results show that the MSE values obtained are lower and the proposed PSNR method is better with (α) 1,044 times than the Kaur method, et al. The result of embed text file extraction from the stego image works well resulting in encrypted and uncompressed text files.  


Author(s):  
Mahmuddin Yunus ◽  
Agus Harjoko

AbstrakPenyembunyian data pada file video dikenal dengan istilah steganografi video. Metode steganografi yang dikenal diantaranya metode Least Significant Bit (LSB) dan Discrete Cosine Transform (DCT). Dalam penelitian ini dilakukan penyembunyian data pada file video dengan menggunakan metode LSB, metode DCT, dan gabungan metode LSB-DCT. Sedangkan kualitas file video yang dihasilkan setelah penyisipan dihitung dengan menggunakan Mean Square Error (MSE) dan Peak Signal to Noise Ratio (PSNR).Uji eksperimen dilakukan berdasarkan ukuran file video, ukuran file berkas rahasia yang disisipkan, dan resolusi video.Hasil pengujian menunjukkan tingkat keberhasilan steganografi video dengan menggunakan metode LSB adalah 38%, metode DCT adalah 90%, dan gabungan metode LSB-DCT adalah 64%. Sedangkan hasil perhitungan MSE, nilai MSE metode DCT paling rendah dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan metode LSB-DCT mempunyai nilai yang lebih kecil dibandingkan metode LSB. Pada pengujian PSNR diperoleh databahwa nilai PSNR metode DCTlebih tinggi dibandingkan metode LSB dan gabungan metode LSB-DCT. Sedangkan nilai PSNR metode gabungan LSB-DCT lebih tinggi dibandingkan metode LSB.  Kata Kunci—Steganografi, Video, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR)                           AbstractHiding data in video files is known as video steganography. Some of the well known steganography methods areLeast Significant Bit (LSB) and Discrete Cosine Transform (DCT) method. In this research, data will be hidden on the video file with LSB method, DCT method, and the combined method of LSB-DCT. While the quality result of video file after insertion is calculated using the Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). The experiments were conducted based on the size of the video file, the file size of the inserted secret files, and video resolution.The test results showed that the success rate of the video steganography using LSB method was 38%, DCT method was 90%, and the combined method of LSB-DCT was 64%. While the calculation of MSE, the MSE method DCT lower than the combined method of LSB and LSB-DCT method. While LSB-DCT method has asmaller value than the LSB method. The PNSR experiment showed that the DCT method PSNR value is higher than the combined method of LSB and LSB-DCT method. While PSNR combined method LSB-DCT higher compared LSB method.  Keywords—Steganography, Video, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR)


2019 ◽  
Vol 5 (2) ◽  
pp. 137-146
Author(s):  
Andre Hernandes ◽  
Hartini Hartini ◽  
Dewi Sartika

Steganografi merupakan sebuah cara yang digunakan untuk menyembunyi-kan pesan rahasia dari orang yang tidak berhak mengetahuinya. Pada penelitian ini penulis menggunakan salah satu metode steganografi yaitu metode least significant bit (LSB) untuk menyisipkan bit-bit pesan rahasia berupa teks kedalam citra digital RGB berekstensi file bitmap, dengan cara menggabungkan metode LSB dan linear congruential generator (LCG) untuk membangkitkan bilangan acak dari posisi pixel yang akan disisipkan pesan rahasia. Hasil dari penelitian ini penulis berhasil membangun aplikasi steganografi dengan bahasa pemrograman java dan menguji kualitas stego image yang menghasilkan nilai rata-rata Peak Signal to Noise Ratio (PSNR) yang mencapai 51 dB. Dari penilaian ini, disimpulkan bahwa stego image yang dihasilkan dalam kualitas baik dan tidak mengalami perubahan yang signifikan.


2018 ◽  
Vol 8 (2) ◽  
pp. 109-122
Author(s):  
Hillman Akhyar Damanik ◽  
Merry Anggraeni

Internet adalah media komunikasi paling populer saat ini, tetapi komunikasi melalui internet menghadapi beberapa masalah seperti keamanan data, kontrol hak cipta, kapasitas ukuran data, otentikasi dan lain sebagainya. Pada penelitian ini peneliti memperkenalkan skema untuk menyembunyikan data yang terenkripsi. Dengan menggunakan citra sebagai embedding dan cover image untuk text hiding. Fitur utama skema adalah cara penyematan data teks ke cover image terenkripsi. Peneliti berkonsentrasi menggunakan metode Red-Green-Blue Least Significant Bit (RGB-LSB). Penyematan data teks dan memverifikasi kinerja menggunakan metode RGB-LSB dalam hal indeks kualitas yaitu Peak Signal-to-Noise Ratio (PSNR) dan Mean Square Error (MSE) , imperceptibility dan indeks recovery. Nilai SME pada jumlah pesan yang disisipi sebanyak 407 kata adalah nilai MSE 0.8310 dan nilai PSNR 48.9348. pada jumlah pesan yang disisipi sebanyak 507 kata adalah nilai MSE 0.8322 dan nilai PSNR 48.9285. Nilai kriteria imperceptibility pada stego image menghasilkan image dan nilai-nilai pixel pada masing-masing cover image tidak mengalami perubahan. Aspek recovery pada penyembunyian pesan teks pada masing-masing cover image pada proses embedding, dimensi citra yang berbeda dan sampai proses ekstraksi juga menghasilkan panjang pesan asli terungkap. Berdasarkan hasil perbandingan ini dapat diketahui bahwa algoritma LSB memiliki hasil yang baik pada teknik penyisipan sebuah pesan pada file citra.


Sign in / Sign up

Export Citation Format

Share Document