scholarly journals Comparative Analysis of Image Steganography using SLT, DCT and SLT-DCT Algorithm

Author(s):  
Lilik Widyawati ◽  
Imam Riadi ◽  
Yudi Prayudi

Steganography is an interesting science to be studied and researched at this time, because steganography is the science of hiding messages on other digital media so that other parties are not aware of the existence of information in the digital media. Steganography is very effective in maintaining information security, because the existence of this information is obscured so that it is difficult to know where it is. This paper discusses hiding text into images using the Slantlet Transform (SLT) method, Descreate Cosine Transform (DCT) and Hybrid of SLT and DCT. The three methods are implemented in the frequency domain where steganographic imagery is transformed from the spatial domain to the frequency domain and the message bit is inserted into the cover image frequency component. The comparison parameters of these three techniques are based on MSE, PSNR, Capacity & Robustness. From the results of the tests that have been done, it is obtained that the highest PSNR value is generated using the SLT-DCT method, the largest storage capacity is the SLT method while the resistance, SLT-DCT method and DCT method are more resistant to attack than the SLT method.

Author(s):  
Chantana Chantrapornchai ◽  
Jitdumrong Preechasuk

Steganography is one of the techniques used to communicate secret data through the cover media such as images, videos, audio, texts etc. In this work, we consider the algorithms of steganography based on DCT and wavelet transform. The aspects of media quality after hiding the information in the digital media are considered. Particularly, we compare the performance of the prototype algorithms, representing the DCT and wavelet-based image steganography algorithms respectively, using the PSNR, capacity, robustness and accuracy aspects. For video steganography, with various wavelet transforms, we compare the quality of the derived information, when frames are dropped and the effects of payload is studied. The application of using such steganography algorithm which can embed multiple messages, each of which requires a separate key is proposed. The application can estimate the capacity used and capacity remains for the given cover image and texts.


2021 ◽  
Vol 15 ◽  
pp. 84-88
Author(s):  
Siddeeq Y. Ameen ◽  
Muthana R. Al-Badrany

The paper presents two approaches for destroying steganogrphy content in an image. The first is the overwriting approach where a random data can be written again over steganographic images whereas the second approach is the denoising approach. With the second approach two kinds of destruction techniques have been adopted these are filtering and discrete wavelet techniques. These two approaches have been simulated and evaluated over two types of hiding techniques, Least Significant Bit LSB technique and Discrete Cosine Transform DCT technique. The results of the simulation show the capability of both approaches to destroy the hidden information without any alteration to the cover image except the denoising approach enhance the PSNR in any received image even without hidden information by an average of 4dB.


Steganography is an information security technique that consists of concealing secret data into digital medias including videos, texts, network protocols and images. In this paper, a steganography method to dissimulate the secret information in gray-scale images is proposed; the dissimulation is adapted to the cover image’s texture, data is hidden in the edge areas. The edge pixels are selected by over-segmentation using Modified Simple Linear Iterative Clustering (M-SLIC). This algorithm allows to decompose the cover image into K regions which we call superpixels. The image’s texture and the amount of the secret data are the factors that help to determine the value of the parameter K. Choosing the pixels of complex regions to conceal secret information is due to the fact that the human visual system is designed to notice changes in the pixels of smooth areas. Therefore, edge areas tolerate larger changes than smooth areas without causing detectable distortions. Experiment on a large set of images were carried out; results illustrate the good performance of the proposed work in terms of capacity, security and imperceptibility in comparison to recent works.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Avinash K. Gulve ◽  
Madhuri S. Joshi

The image steganography systems use either the spatial domain or the frequency domain to hide the secret information. The proposed technique uses spatial domain technique to hide secret information in the frequency domain. The cover image is transformed using integer wavelet transform to obtain four subbands: LL, LH, HL, and HH. Then, the PVD approach is used to hide the secret information in the wavelet coefficients of all the four subbands. For improving the security of the hidden information, the proposed method first modifies the difference between two wavelet coefficients of a pair and then uses the modified difference to hide the information. This makes extraction of secret data from the stego image difficult even if the steganography method fails. The result shows that the proposed technique outperforms other PVD based techniques in terms of security of secret information and hiding capacity of cover image.


Author(s):  
Rahul Dixit ◽  
Amita Nandal ◽  
Arvind Dhaka ◽  
Vardan Agarwal ◽  
Yohan Varghese

Background: Nowadays information security is one of the biggest issues of social networks. The multimedia data can be tampered with, and the attackers can then claim its ownership. Image watermarking is a technique that is used for copyright protection and authentication of multimedia. Objective: We aim to create a new and more robust image watermarking technique to prevent illegal copying, editing and distribution of media. Method : The watermarking technique proposed in this paper is non-blind and employs Lifting Wavelet Transform on the cover image to decompose the image into four coefficient matrices. Then Discrete Cosine Transform is applied which separates a selected coefficient matrix into different frequencies and later Singular Value Decomposition is applied. Singular Value Decomposition is also applied to the watermarking image and it is added to the singular matrix of the cover image which is then normalized followed by the inverse Singular Value Decomposition, inverse Discrete Cosine Transform and inverse Lifting Wavelet Transform respectively to obtain an embedded image. Normalization is proposed as an alternative to the traditional scaling factor. Results: Our technique is tested against attacks like rotation, resizing, cropping, noise addition and filtering. The performance comparison is evaluated based on Peak Signal to Noise Ratio, Structural Similarity Index Measure, and Normalized Cross-Correlation. Conclusion: The experimental results prove that the proposed method performs better than other state-of-the-art techniques and can be used to protect multimedia ownership.


Author(s):  
John Henry Navarro-Devia ◽  
Dzung Viet Dao ◽  
Yun Chen ◽  
Huaizhong Li

Abstract Vibrations during milling of hard-to-cut materials can cause low productivity, inferior quality and short tool life. It is one of the common issues in the machining of hard-to-cut materials employed in aerospace applications, such as titanium alloys. This paper presents an analysis of the vibration signals in the 3 axes of movement during titanium end milling, under diverse cutting parameters, manipulating spindle speed and feed rate. Signals were obtained using a triaxial accelerometer and processed in MATLAB. The analysis was conducted in the frequency-domain and the time-frequency domain. The results show that high-frequency vibration could occur in any direction with different amplitudes. Response on each axis depends on spindle speed, feed, and type of milling. A frequency component continually appeared in each axis regardless of cutting conditions and is located near the natural frequencies. Finally, the triaxial accelerations were compared for the milling cases with a new and a worn tool. Results highlight the importance and need for continuous monitoring of vibration in the 3 axes, instead of only using a single-channel signal, providing experimental data which could expand knowledge relating to the milling of titanium alloys.


2020 ◽  
pp. 58-86
Author(s):  
Semjon F. Adlaj ◽  
◽  
Sergey N. Pozdniakov ◽  

This article is devoted to a comparative analysis of the results of the ReMath project (Representing Mathematics with digital media), devoted to the study of digital representations of mathematical concepts. The theoretical provisions and conclusions of this project will be analyzed based on the theory of the information environment [1], developed with the participation of one of the authors of this article. The analysis performed in this work partially coincides with the conclusions of the ReMath project, but uses a different research basis, based mainly on the work of Russian scientists. It is of interest to analyze the work of the ReMath project from the conceptual positions set forth in this monograph and to establish links between concepts and differences in understanding the impact of computer tools (artifacts) on the process of teaching mathematics. At the same time, the authors dispute the interpretation of some issues in Vygotsky’s works by foreign researchers and give their views on the types and functions of digital artifacts in teaching mathematics.


2015 ◽  
Vol 7 (1) ◽  
pp. 69-84 ◽  
Author(s):  
Yi Jie Tong ◽  
Wei Qi Yan ◽  
Jin Yu

With an increasing number of personal computers introduced in schools, enterprises and other large organizations, workloads of system administrators have been on the rise due to the issues related to energy costs, IT expenses, PC replacement expenditures, data storage capacity, and information security, etc. However, Application Virtualization (AV) has been proved as a successful cost-effective solution to solve these problems. In this paper, the analytics of a Virtual Desktop Infrastructure (VDI) system will be taken into consideration for a campus network. Our developed system will be introduced and justified. Furthermore, the rationality for these improvements will be introduced.


Sign in / Sign up

Export Citation Format

Share Document