scholarly journals Adaptive Steganography using 3D Color Texture Feature

Human vision framework is commonly an emotional recognition which differs according to people. Intricacy of a picture assumes huge job while verifying information in to it. In this paper another steganography approach is introduced which uses joined 3D Color Texture Feature (CTF) to distinguish complex districts of picture for information stowing away so visual assault to identify shrouded message turns out to be very testing. Recurrence area is utilized to shroud the information in these chose complex areas by means of Discrete Cosine Transform (DCT). These sorts of zones are initially boisterous and separating additional data is difficult. Each picture has diverse multifaceted nature levels and spatial districts, and since information covering up is legitimately reliant on it, so the steganography framework ends up versatile. The outcome demonstrates that proposed versatile strategy gives secure message stowing away while keeping up subtlety quality and high implanting limit. Last spread pictures keeps up PSNR estimation of over 50. Inserting limit is around multiple times higher in contrast with comparative calculation which uses Gray Level Co-event Matrices (GLCM) highlight to recognize complex districts of pictures for information covering up.

2021 ◽  
Vol 3 (1) ◽  
pp. 1-6
Author(s):  
Zulfrianto Yusrin Lamasigi

Batik merupakan kain yang dibuat khusus, batik sendiri terbilang unik karena memiliki motif tertentu yang dibuat berdasarkan unsur budaya dari daerah asal batik itu dibuat. setiap motif dan warna batik berbeda-beda sehingga sulit untuk dikenali asal dari motir batik itu sendiri. penelitian ini bertujuan untuk meningkatkan hasil ektraksi fitur pada identifikasi motif batik. metode yang digunakan dalam penelitian ini adalah Discrete Cosine Transform bertujuan untuk meningkatkan hasil ektraksi fitur Gray Level Co-Occurrence Matrix untuk mendapatkan hasil akurasi identifikasi motif batik yang lebih baik, sedangkan untuk mengetahui nilai kedekatan antara data training dengan data testing citra batik akan menggunakan K-Nearest Neighbour berdasarkan nilai ekstraksi fitur yang diperoleh. dalam eksperimen ini dilakukan 4 kali percobaan berdasarkan sudut 0°, 45°, 90°, dan 135° pada nilai k=1, 3, 5, 7, dan 9. sementara itu, untuk menghitung tingkat akurasi dari klasifikasi KNN akan menggunakan confusion matrix. Dari uji coba yang di lakukan dengan menggunakan jumalah data training sebanyak 602 citra dan data testing 344 citra terhadap semua kelas berdasarkan sudut 0°, 45°, 90°, dan 135° pada nilai k=1, 3, 5, , dan 9 akurasi tertinggi yang diperoleh DCT-GLCM ada pada sudut 135° dengan nilai k=3 sebesar 84,88% dan yang paling rendah ada pada sudut 0° dengan nilai k=7 dan 9 sebesar 41,86%. Sedangkan hasil uji dengan hanya mennggunakan GLCM akurasi tertinggi ada pada sudut 135° dengan nilai k=1 sebesar 77,90% dan yang paling rendah ada pada sudut 90° dengan nilai k=7 sebesar 40,69%. Dari hasil uji coba yang dilakukan menunjukkan bahwah DCT bekerja dengan baik untuk meningkatkan hasil ekstraksi fitur GLCM yang dibuktikan dengan hasil rata-rata akurasi yang diperoleh.Batik is a specially made cloth, batik itself is unique because it has certain motifs that are made based on cultural elements from the area where the batik was made. each batik motif and color is different so it is difficult to identify the origin of the batik motir itself. This study aims to improve the feature extraction results in the identification of batik motifs. The method used in this research is Discrete Cosine Transform, which aims to increase the extraction of the Gray Level Co-Occurrence Matrix feature to obtain better accuracy results for identification of batik motifs, while to determine the closeness value between training data and batik image testing data will use K- Nearest Neighbor based on the feature extraction value obtained. In this experiment, 4 experiments were carried out based on angles of 0 °, 45 °, 90 °, and 135 ° at values of k = 1, 3, 5, 7, and 9. Meanwhile, to calculate the level of accuracy of the KNN classification, confusion matrix will be used. . From the trials carried out using the total training data of 602 images and testing data of 344 images for all classes based on angles of 0 °, 45 °, 90 °, and 135 ° at values of k = 1, 3, 5, and 9 accuracy The highest obtained by DCT-GLCM was at an angle of 135 ° with a value of k = 3 of 84.88% and the lowest was at an angle of 0 ° with values of k = 7 and 9 of 41.86%. While the test results using only GLCM, the highest accuracy is at an angle of 135 ° with a value of k = 1 of 77.90% and the lowest is at an angle of 90 ° with a value of k = 7 of 40.69%. From the results of the trials conducted, it shows that the DCT works well to improve the results of the GLCM feature extraction as evidenced by the average accuracy results obtained.


Author(s):  
Rahul Dixit ◽  
Amita Nandal ◽  
Arvind Dhaka ◽  
Vardan Agarwal ◽  
Yohan Varghese

Background: Nowadays information security is one of the biggest issues of social networks. The multimedia data can be tampered with, and the attackers can then claim its ownership. Image watermarking is a technique that is used for copyright protection and authentication of multimedia. Objective: We aim to create a new and more robust image watermarking technique to prevent illegal copying, editing and distribution of media. Method : The watermarking technique proposed in this paper is non-blind and employs Lifting Wavelet Transform on the cover image to decompose the image into four coefficient matrices. Then Discrete Cosine Transform is applied which separates a selected coefficient matrix into different frequencies and later Singular Value Decomposition is applied. Singular Value Decomposition is also applied to the watermarking image and it is added to the singular matrix of the cover image which is then normalized followed by the inverse Singular Value Decomposition, inverse Discrete Cosine Transform and inverse Lifting Wavelet Transform respectively to obtain an embedded image. Normalization is proposed as an alternative to the traditional scaling factor. Results: Our technique is tested against attacks like rotation, resizing, cropping, noise addition and filtering. The performance comparison is evaluated based on Peak Signal to Noise Ratio, Structural Similarity Index Measure, and Normalized Cross-Correlation. Conclusion: The experimental results prove that the proposed method performs better than other state-of-the-art techniques and can be used to protect multimedia ownership.


1990 ◽  
Vol 26 (8) ◽  
pp. 503
Author(s):  
S.C. Chan ◽  
K.L. Ho

Sign in / Sign up

Export Citation Format

Share Document