scholarly journals INSERTING MESSAGE SECRET ON FILE DATA BANK USING STEGANOGRAPHY ENGINEERING WITH EOF (END OF FILE) METHOD

2020 ◽  
Vol 2 (4) ◽  
pp. 193-200
Author(s):  
Michael Sitorus ◽  
Deki Satria

Exchanging information does not realize that is important information. Circulates often important information insignificant but such as account bank customer information. The threat of security to information such as interruption, interception, modification, and fabrication. Thefts of information data by irresponsible parties. This research aims to secure information data in the form file digital image to be inserted with a secret message on building application for a secret message security system in the Bank with applying steganography using the End Of File (EOF) method. Steganography application capable of inserting secret messages in digital image data files. The results of the research are able to keep the existence of the message hidden. When other people receive image files, they can only see the images with the naked eye. So all messages are invisible and will not be read for hackers or other people before knowing the security side and open of password or reading the secret message.

2010 ◽  
Vol 174 ◽  
pp. 144-147
Author(s):  
Xin Ying Hu ◽  
Xiu Ping Zhao

Digital watermarking has been proposed as a way to claim the ownership of the source and owner of the digital image data. In this paper, A robust algorithm based on DCT region is proposed to improve the image security. The main transforming is based on DCT (Discrete Cosine Transform). The algorithm was processed in the MATLAB software. In this paper, images of gray scale and RGB color scale were researched respectively. For color images, in order to get the best image quality, the RGB scale was transformed to YcbCr scale. Then, the Y channel (brightness channel) was separated, in which the watermark was embedded and extracted. The results show that the algorithm embedded a certain size of black and white Bitmap image into gray and color images. The watermark can’t be seen by the naked eye. The robustness detection experiment was also carried out. The watermark can still be extracted after certain amount of tailoring, defacing, Gaussian noise, and format changes. The similarity is more than 0.7. It confirmed that the algorithm is highly robust.


Author(s):  
Haikal Nando Winata ◽  
Raja Nasrul Fuad

Steganography is a technique to hide text or messages that other people do not know the contents of the text or the secret message. Steganography technique is often used to avoid suspicion and to avoid other people desire to know the contents of the text or the secret message. Digital image is one of the most well-known media and the public by the author. Digital image acts as a medium or a text container you want to hide a secret message. Methods LSB (Least Significant Bit) that hides the bytes of text or message you want to hide into the last byte in the digital image. LSB method has the advantage of not changing the size and shape of the digital image by naked eye, text data or messages hidden can be restored without any change in size and shape


2011 ◽  
Vol 2 (1) ◽  
Author(s):  
Vina Chovan Epifania ◽  
Eko Sediyono

Abstract. Image File Searching Based on Color Domination. One characteristic of an image that can be used in image searching process is the composition of the colors. Color is a trait that is easily seen by man in the picture. The use of color as a searching parameter can provide a solution in an easier searching for images stored in computer memory. Color images have RGB values that can be computed and converted into HSL color space model. Use of HSL images model is very easy because it can be calculated using a percent, so that in each pixel of the image can be grouped and named, this can give a dominant values of the colors contained in one image. By obtaining these values, the image search can be done quickly just by using these values to a retrieval system image file. This article discusses the use of the HSL color space model to facilitate the searching for a digital image in the digital image data warehouse. From the test results of the application form, a searching is faster by using the colors specified by the user. Obstacles encountered were still searching with a choice of 15 basic colors available, with a limit of 33% dominance of the color image search was not found. This is due to the dominant color in each image has the most dominant value below 33%.   Keywords: RGB, HSL, image searching Abstrak. Salah satu ciri gambar yang dapat dipergunakan dalam proses pencarian gambar adalah komposisi warna. Warna adalah ciri yang mudah dilihat oleh manusia dalam citra gambar. Penggunaan warna sebagai parameter pencarian dapat memberikan solusi dalam memudahkan pencarian gambar yang tersimpan dalam memori komputer. Warna gambar memiliki nilai RGB yang dapat dihitung dan dikonversi ke dalam model HSL color space. Penggunaan model gambar HSL sangat mudah karena dapat dihitung dengan menggunakan persen, sehingga dalam setiap piksel gambar dapat dikelompokan dan diberi nama, hal ini dapat memberikan suatu nilai dominan dari warna yang terdapat dalam satu gambar. Dengan diperolehnya nilai tersebut, pencarian gambar dapat dilakukan dengan cepat hanya dengan menggunakan nilai tersebut pada sistem pencarian file gambar. Artikel ini membahas tentang penggunaan model HSL color space untuk mempermudah pencarian suatu gambar digital didalam gudang data gambar digital. Dari hasil uji aplikasi yang sudah dibuat, diperoleh pencarian yang lebih cepat dengan menggunakan pilihan warna yang ditentukan sendiri oleh pengguna. Kendala yang masih dijumpai adalah pencarian dengan pilihan 15 warna dasar yang tersedia, dengan batas dominasi warna 33% tidak ditemukan gambar yang dicari. Hal ini disebabkan warna dominan disetiap gambar kebanyakan memiliki nilai dominan di bawah 33%. Kata Kunci: RGB, HSL, pencarian gambar


1988 ◽  
Vol 10 ◽  
pp. 92-94 ◽  
Author(s):  
Manfred A. Lange

An integrated system for ice-fabric analysis on a Rigsby stage is described. The system consists of a regular Rigsby stage fitted with two opto-electronic sensors for assessment of azimuth and the tilt angle of each individual grain. Signals from the sensors are transmitted to a computer terminal via an interface box, which facilitates transformation of Gray-coded data to ASCII data records. The terminal is hooked up to a main-frame computer (VAX 750), where the digitized angles of the c-axis orientations of individual thin sections are stored in separate data files. These files are compatible with other already existing files containing additional ice-core data and thus become part of an extensive data bank. Appropriate software has been developed to produce, among other things, plots of c-axis orientations in a Schmidt net.


2019 ◽  
Vol 31 (2) ◽  
pp. 158-180
Author(s):  
Bailu Fu ◽  
Xiaogang Liu

Purpose The current studies on the clothing silhouette are very limited. The purpose of this paper is to propose an innovative framework to intelligently identify the womenswear silhouette with the latest computer technologies. To clearly define the womenswear silhouette, an accurate numerical definition is proposed. Design/methodology/approach The study first processes and segments the useful parts on the static catwalk image data files following existing graphic extraction approaches. Six basic alphabetical womenswear silhouette types are selected and numerically defined. Then, the proposed framework automatically classifies the six basic womenswear silhouettes considering the different slopes between three main clothing parts. Six clothing situations are discovered according to different designs and the detailed cases are systematically categorized. In addition, aspects influencing the judgment of the clothing silhouettes such as the skin, the background, the drastic change points are also considered. The proposed silhouette definition and identification framework is novel and proved accurate. Findings The proposed definition and identification framework of womenswear silhouettes have been proved a viable approach that is fully compatible with the current computer technologies. The validation study shows that the presented identification procedure has a desirable accuracy over 90 percent. Originality/value The proposed methodology develops brand new standards to numerically define and identify the womenswear silhouette, which was not available in the past. Besides, the measurement, the identification and the classification procedures are fully validated by the image data collected from 14 world famous brands over 11 consecutive seasons. It is shown that the proposed numerical framework of the womenswear silhouettes is a robust one, considering all of the observed design variabilities.


Author(s):  
Colin C. Venters ◽  
Richard J. Hartley ◽  
William T. Hewitt

The proliferation in volume of digital image data has exacerbated the general image retrieval problem, creating a need for efficient storage and flexible retrieval of vast amounts of image data (Chang, 1989). Whilst there have been significant technological advances with image data capture and storage, developments in effective image retrieval have not kept pace. Research in image retrieval has been divided into two areas: concept-based image retrieval and content-based image retrieval. The former focuses on the use of classification schemes or indexing terms to retrieve images while the latter focuses on the visual features of the image, such as colour, shape, texture, and spatial relationships.


Sign in / Sign up

Export Citation Format

Share Document