High Efficient Data Embedding in Image Steganography Using Parallel Programming

Author(s):  
Usha B. A.

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points.. As embedding data in an image, is independent of one another. Parallelism can be used to achieve considerable time gain. nography, although it has made communication safe, it has its own drawbacks. One among it is time required to embed data in pixels of the image. This problem is bugging computer scientists from long time. This paper discusses a method which makes OpenMP parallel library to parallelize embedding of data, which basically reduces the time by almost fifty percent and to achieve PSNR ranging from 30 to 50 after embedding data in the pixels of the image.

Author(s):  
Nisha Manral

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of image steganography, its uses and techniques. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.


Author(s):  
Sakshi Meshram ◽  
Pragati Nimje ◽  
Apeksha Dhengre ◽  
Tanvi Bingewar ◽  
Gauri Shende ◽  
...  

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of stenographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project intends to give an overview of image steganography, its uses and techniques. It also supports steganography in Audio files. For a more secure approach, the project encrypts the message using secret key and then sends it to the receiver. The receiver then decrypts the message to get the original one.


Author(s):  
Asoke Nath ◽  
Soham Mondal ◽  
Raj Deb ◽  
Akash Das

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier ?le formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This project hides the message within the image. This project uses LSB Substitution method to hide the secret message inside the image. Sender select the cover image with the secret message ?le (which can be of any format) and hide it into the image, it help to generate the secure stego image. The stego image is sent to the destination with the help of private or public communication network. On the other side the receiver downloads the stego image and using the software retrieve the secret text hidden in the stego image.


Author(s):  
Kenji Ikeda ◽  
Yusuke Kawamura ◽  
Masahiro Kobayashi ◽  
Taito Fukushima ◽  
Yushi Sorin ◽  
...  

Background: Although DC Bead has been useful in treatment of multiple and large hepatocellular carcinoma, loading time of doxorubicin into the DC Bead takes a long time of 30-120 minutes. Epirubicin is also used as an antitumor agent together with DC Bead, but its loading efficiency was not sufficiently elucidated. Methods: To shorten loading time of epirubicin into DC Bead (100-300µm, 300-500µm, 500-700µm), we examined the following three methods after mixing the drug: (a) let stand in room temperature, (b) agitated for 30 seconds with Vortex mixer, and (c) sonicated for 30 seconds with ultrasonic cleaner. After loading of epirubicin by each method, supernatant concentration for epirubicin was assayed at 5, 10, 30, 60, and 120 minutes. Results: Epirubicin loading rates for small bead (100-300µm) at 5 minutes were 82.9 % in group a, 93.8% in group b, and 79.9 % in group c. Similarly, medium bead (300-500µm), 40.1% in group a, 65.7% in group b and 45.5% in group c, respectively. In large-sized bead (500-700µm), loaded rates of epirubicin were 38.8% in group a, 59.0% in group b and 48.0% in group c. Agitation of mixture of epirubicin and DC Bead with Vortex mixer significantly shortened the loading time, but sonication did not affect the time required. Microscopic examination did not lead to any morphological change of microspheres in all the methods. Conclusions: Short time of agitation with Vortex mixer reduced the necessary time for loading of epirubicin in every standard of DC Bead.


GIS Business ◽  
2019 ◽  
Vol 14 (6) ◽  
pp. 656-666
Author(s):  
Dr. Entisar Al-Obaidi

Media refers to the channels of communication through which we distribute news, education, movies, music, advertising messages and other information. It includes physical and online newspapers and magazines, television, radio, telephone, the Internet, fax and billboards, are a dominant force in lives of children. Although television is remaining the predominant medium for children and adolescents, the new technologies are become more popular. We have to concern about the potential harmful effects of media "messages and images"; however, the positive and negative effects of media should be recognized. Parents have to establish the plan for all media in family home. Media that are influences on children should be recognized by "schools, policymakers, product advertisers, and entertainment producers".


Author(s):  
Bojan Ljuijić

Beside the fact that the Internet was not primarily educational network (it didn’t emerge from the intention to be systematically used in the field of education), shortly after it emerged, possibilities of its application in education were recognised. This paper is dedicated to analysis of the most important chronological moments (technological and social in the first place) that were crucial in sense of comprehensive application of the Internet in service of education in general, but also in service of adult education. Having all mentioned in focus, in more details, we analysed emergence and development of the Internet observed as educational computer network in frame of general development of information and communication technologies. While realising mentioned analysis, our focus was on four historical periods of educational computer technologies. We also intended to emphasize the activities of international institutions that followed, encouraged and supported the development of the Internet use and the use of other information and communication technologies in the field of education. According to that, we distinguished the main moments referring activities of these organisations which describe in the best manner their contributions to growing application of the Internet in education in general, but also in adult education.


2009 ◽  
Vol 33 (4) ◽  
pp. 115-148 ◽  
Author(s):  
Bruce E. Moon

Prospects for democracy in Iraq should be assessed in light of the historical precedents of nations with comparable political experiences. Saddam Hussein's Iraq was an unusually extreme autocracy, which lasted an unusually long time. Since the end of the nineteenth century, only thirty nations have experienced an autocracy as extreme as Iraq's for a period exceeding two decades. The subsequent political experience of those nations offers a pessimistic forecast for Iraq and similar nations. Only seven of the thirty are now democratic, and only two of them have become established democracies; the democratic experiments in the other five are still in progress. Among the seven, the average time required to transit the path from extreme autocracy to coherent, albeit precarious, democracy has been fifty years, and only two have managed this transition in fewer than twenty-five years. Even this sober assessment is probably too optimistic, because Iraq lacks the structural conditions that theory and evidence indicate have been necessary for successful democratic transitions in the past. Thus, the odds of Iraq achieving democracy in the next quarter century are close to zero, at best about two in thirty, but probably far less.


1940 ◽  
Vol 13 (4) ◽  
pp. 898-904 ◽  
Author(s):  
Yu S. Lazurkin

Abstract Most articles made from elastic substances are intended for service under dynamic conditions. Static methods of investigation are clearly insufficient for determining the behavior of elastic substances under dynamic conditions and therefore there has for a long time been a need for dynamic tests. In recent years several dynamic tests have been developed, and a number of investigations of elastic properties under dynamic conditions have been published. The works of Frumkin, Roelig, Kosten, Naunton and Waring and other investigators have established a series of relations in the behavior of elastic substances under dynamic conditions. However, the limited intervals of frequency and temperature in these experiments gave relations of peculiar character and even led to contradictions. Thus Naunton and Waring showed that, under dynamic conditions (at high frequencies), automobile tire casings act as solid hoops and, according to Roelig and Kosten, the relation between modulus and frequency, though still existing, is of relatively little importance. The development of a concept of the mechanism of highly elastic deformation, and in particular the disclosure of relaxation made it possible for Kornfel'd and Poznyak and Mikhai˘lov and Kirilina to demonstrate experimentally the existence of a more general law relating the phenomena. However, in their experiments, the frequency in both cases changed within narrow limits, and consequently these investigations too do not give a general picture of the behavior of elastic materials in relation to the frequency of deformation and temperature. The idea of highly elastic deformation, as well as that of relaxation, comes down to the fact that the magnitudes of the deformations observed depend on the relation between the time of action of the force and the time required for regrouping of the particles in the substance during the deformation.


2007 ◽  
Vol 48 (8) ◽  
pp. 851-853 ◽  
Author(s):  
H. Eklöf ◽  
E. Radecka ◽  
P. Liss

Background: The development of digital imaging systems for radiology in combination with the possibility to transfer large quantities of data over the Internet has increased the interest in teleradiology. Transferring nighttime examinations to an evaluation center in a daytime zone may provide improved patient security, better working hours for radiologists, and reduced costs for emergency radiological services. Purpose: To evaluate the time required for transferring radiological information from Uppsala (Sweden) to Sydney (Australia). Material and Methods: A radiologist in Sydney reported on radiological examinations performed in Uppsala. The time required for downloading 75 examinations and returning 24 reports was registered. Results: Downloading was completed in <60 min for all conventional radiological examinations, but only 44% of computed tomography (CT) examinations with >65 images. Reports were completed in <10 min. Turnaround time was directly related to the time required for downloading the images. The Sydney report was available in Uppsala within 30 min of the in-house report in 79% of examinations. Conclusion: The main challenge for emergency teleradiology is the time required for downloading large volumes of data over the Internet.


2013 ◽  
Author(s):  
Martin Fenner

The standard local file formats for bibliographic data are probably bibtex and RIS. They have been around for a long time, and are supported by all reference managers and many other tools and services. Unfortunately these formats are far from perfect:neither ...


Sign in / Sign up

Export Citation Format

Share Document