SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
International Journal of Engineering Research and Development
eISSN : 2278-067X, pISSN : 2278-800X, www.ijerd.com
Volume 2, Issue 3 (July 2012), PP. 01-07

         Multimedia Data Compression by Dynamic Dictationary
                 Approach with Stegnography Facility
                    1
                        Kanindra Shrivastava, 2 Vinay Jain, 3 Mohan Awasthi
                                         1,2,3
                                                 Dept. of E&TC, SSCET BHILAI, India



Abstract––This paper presents a proposal for communication which is major part of daily life of today.We are living an
age of science. . With the increasing communication traffic demand, data security has become very important field. Lots
of data security and data hiding algorithms have been developed in the last decade. we are implementing a method of
“Digital Stenography” for image data hiding. Image Steganography system allows an average user to securely transfer
text messages by hiding them in a digital image file. A combination of Steganography and encryption algorithms provides
a strong backbone for its security. Digital Image Steganography system features innovative techniques for hiding text in a
digital image file or even using it as a key to the encryption.

                                                 I.       INTRODUTION
           The word steganography is of Greek origin and means "covered, or hidden writing". Steganography is the art and
science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes
there is a hidden message. Generally, a steganographic message will appear to be something else: a picture, an article, a
shopping list, or some other message. A steganographic message (the plaintext) is often first encrypted by some traditional
means, producing a cipher text. image steganography system is a stand-alone application that combines steganography and
encryption to enhance the confidentiality of intended message. The user’s intended message is first encrypted to create
unintelligible cipher text. Then the cipher text will be hidden within an image file in such a way as to minimize the perceived
loss in quality. The recipient of the image is able to retrieve the hidden message back from the image with this system.

           The JPEG format is currently the most common format for storing image data. It is also supported by virtually all
software applications that allow viewing and working with digital images Recently, several steganographic techniques for data
hiding in JPEGs have been developed .

                         II.          IMAGE STEGANOGRAPGY ALGORITHM
           The OutGuess steganographic algorithm was proposed to counter the statistical chi-square attack . In the first pass,
similar to J-Steg, OutGuess embeds message bits along a random walk into the LSBs of coefficients while skipping 0’s and
1’s. After embedding, the image is processed again using a second pass. This time, corrections are made to the coefficients to
make the stego image histogram match the cover image histogram. Because the chi-square attack is based on analyzing first-
order statistics of the stego image, it cannot detect messages embedded using OutGuess. Provos also reports that the
corrections are made in such a manner to avoid detection using his generalized chi-square attack .

           In our attack on OutGuess, we use the fact that the embedding mechanism in OutGuess is overwriting the LSBs.
This means that embedding another message into the stego image will partially cancel out and will thus have a different
effect on the stego image than on the cover image.

Outguess
Proposed by Neils Provos in 2001 as a response to the ststistical chi –square attact by Andreas Westfeldin 1999.

Main feature of outguess
   1. outguess hides messages in JPEG files
   2. It embeds hides messages in bits in LSBs of quantized

DCT coefficients along a key –dependent walk through the image.
   a) Outguess Preserves the histogram of DCT coefficients exactly.
   b) Outguess cannot be detected using the chi –square attack or its generalized versions.
   c) Embed secret information in DCT domain.
   d) Modifies LSBs of DCT coefficients at random locations.
   e) Corrects statistical deviation by modifying unused LSBs.
   f) Distribution of DCT coefficients is preserved after embedding process.
   g) An a priori embedding capacity for an image can be determined




                                                               1
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility




                                             Fig 1 Block diagram of Algorithm

                    III.           JPEG STEGANOGRAPHY AND ALGORITHMS
3.1 JPEG Format
          Strictly speaking, JPEG refers only to a family of compression algorithms; it does not refer to a specific image file
format. The JPEG committee was prevented from defining a file format by turf wars within the international standards
organizations. JFIF has emerged as the de-facto standard on Internet, and is what is most commonly meant by "a JPEG file.
JPEG works by extracting coefficients describing 8x8 pixel blocks and then compressing these coefficients. The blocks can
be revealed by saving a JPEG of a gradient pattern with the lowest possible compression quality. The blocks, which start in
the upper left-hand corner, are shown in Fig. Partial blocks will be included on the right and lower edges if the dimensions
are not divisible by 8 pixels




                                        Left: gradient with high quality compression
                                        Right: gradient with low quality compression
                                                            Fig 2




                                                              2
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility

                              IV.           ALGORITHM FOR ENCODING
    1)   The input is a Buffered Image object, which contains a Color Model and a matrix representing the image with
         pointers aimed at indices of the Color Model. The RGB values of the uncompressed input image are converted into
         three components: one luminance component and two chrominance components (YUV). The luminance
         component is considered more important.
    2)   The image is separated into 8x8 pixel blocks starting from the upper left-hand corner.
    3)   The component signals for each 8x8 block are transformed into the frequency domain by using the two-
         dimensional discrete cosine transform (DCT). This transformation is similar to the two-dimensional fast Fourier
         transformation.
    4)   While the coefficients closest to 0 are eliminated, the remaining coefficients are quantized using various degrees of
         accuracy. This can be modified by changing the quantization tables. The DC luminance coefficients are the most
         important and are quantized with the most accuracy.
    5)   Since the DC luminance coefficients are quantized with the most accuracy, we will hide the information inside
         them
    6)   Finally, the quantized coefficients are compressed using a Huffman encoder

                               V.           ALGORITHM FOR DECODING
          The decoding scheme is much simpler than encoding. The averages of the luminance of the 8x8 blocks just need to
be calculated and converted back to bits.

Basically what we exactly do in decoding process is:-
    1) The user needs to provide a Source Image and any Keys used when the Source Image was generated.
    2) If a non-default key was used in text hiding process, the receiving party must have prearranged knowledge of the
          key for use in retrieving the text.
    3) After the Source Image and any required Keys are loaded into the application, the hidden text can be retrieved by
          selecting Extract Text from the Tools menu




                      The generic process of Encoding and Decoding is demonstrated in this diagram
                                                         Fig 5

                                      VI.           SYSTEM ANALYSIS
6.1 System Analysis Methodology
          The methodology used for System Analysis is the Object Oriented Analysis. The OOA process begins with an
understanding of a manner in which the system is used by people. Once the scenario of usage is defined, the modeling of the
software begins.

         Use Cases model the system from the end user’s point of view. The use case diagram for our system is as follows
The use case achieves the following objectives:
    a) Define the functional and operational requirements of the system by define a scenario of usage that is agreed upon
         by the end user and the software engineering team.
    b) Provide a clear view of the system’s functionality.




                                                             3
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility




                                                Fig. 6 Use Case Diagram

6.2 User Interface
User interface consist of three main panels are Main Panel, Key Panel, & Source/Target Panel.

Main Panel: The main panel of the application contains a Text tab and an Image tab as described below. Both the text and
image cannot be viewed at the same time in the main panel; however, a scaled version of the image is always shown in the
Source/Target pane, so both will be visible if the text tab for the main panel is selected.
    i) Text Tab: This is the main text area into which the user types the text to be hidden within an image. In the case of
         extracting text from an image, the text would be loaded into this same tab.
    ii) Image Tab: This tab is also located within the main panel. Its sole purpose is to display an image that has been
         produced as a result of embedding text within another image.

Key Panel: The Key Panel will have a text key tabs that will display the selected key. The selected key will be the key the
program uses.
     i) Text tab: The user may type directly into the text tab. He can also use Open Text Key from the Tools menu to load
          text as a key. The text continues to be editable once a text file has been loaded.

Source/Target Panel: The Source/Target Panel shows the image that will contain hidden text, or an image, which we would
like to extract text from. An image can be loaded into the Source/Target Pane either from the Image Bar via the Load Image
button that will load highlighted image or through File menu ‡ Open Image File.

6.3 Activity Diagram
          An activity diagram is essentially a flowchart, showing flow of control from activity to activit y. It is used to
model the dynamic aspects of the system. An activity is an ongoing execution in the system. Activities ultimately result in
actions, which is made up of executable atomic computations that result in a change in state of the system or retur n of a
value.




                                                            4
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility




                        Fig. 7 Activity Diagram for embedding




                        Fig. 8 Activity Diagram for Extracting




                                          5
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility

6.4 Input/Output Screens
 .




                                                       Fig.9 Login Screen




                                                        Fig.10 Main Panel

                                            VII.            CONCLUSION
          The application is primarily intended to be used to inconspicuously hide confidential and proprietary information
by anyone seeking to hide information. This software has an advantage over other information security systems because the
hidden text are in the form of image, which is not obvious text information carriers.

          Because of its user-friendly interface, the application can also be used by anyone who wants to securely transmit
private information. The main advantage of this program for individuals is that they do not have to have any knowledge
about steganography or encryption. The visual way to encode the text, plus the visual key makes it easy for average users to
navigate within the program. To send a message, a source text, an image in which the text should be embedded, and a key
are needed. The key is used to aid in encryption and to decide where the information should be hidden in the image. A short
text can be used as a key. To receive a message, a source image containing the information and the corresponding key are
both required. The result will appear in the text tab after decoding.

          The common Internet-friendly format is offered. It is inherently more difficult to hide information in a JPEG image
because that is exactly what the designers of JPEG wanted to avoid: the transmission of extra information that doesn't a ffect
the appearance of the image.

                                                       REFERENCES
[1].      Daniel L.Lau, Robert Ulichney, Gonzalo R.Arce, “Fundamental Characteristics of Halftone Textures: Blue-Noise and Green-
          Noise”, Image Systems Laboratory, HP Laboratories Cambridge, March 2003.
[2].      C.Yang and C.Laih, “New colored visual secret sharing schemes”, Designs, Codes and Cryptography, vol.20, 2000, pp.325-335.
[3].      C.Chang, C.Tsai, and T.Chen, “A new scheme for sharing secret color images in computer network”, in Proc. of International
          Conference on Parallel and Distributed Systems, 2000, pp. 21-27.
[4].      R.L.Alder, B.P.Kitchens, M.Martens, “The mathematics of halftoning”, IBM J. Res. & Dev. Vol.47 No.1, Jan. 2003, pp. 5 -15.
[5].      R.Lukac, K.N.Plantaniotis, B.Smolka, “A new approach to color image secret sharing”, EUSIPCO 2004, pp.1493-1496.
[6].      H.Ancin, Anoop K.Bhattacharjya, Joseph Shu, “Improving void-and-cluster for better halftone uniformity”,International
          Conference on Digital Printing Technoogies.
[7].      N . Provos, “Defending Against Statistical Steganography,” Proc 10th USENEX Security Symposium 2005.
                                                                 6
Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility
 [8].   N . Provos and P. Honeyman, “Hide and Seek: An introduction to Steganography,” IEEE Security & Privacy Journal 2003.
 [9].   S . Katzenbeisser and Petitcolas , ”Information Hiding Techniques for Stenography and Digital watermaking” Artech House,
        Norwood, MA. 2000 .
[10].   L. Reyzen And S. Russell , “More efficient provably secure Steganography” 2007.
[11].   S.Lyu and H. Farid , “Steganography using higher order image statistics , “ IEEE Trans. Inf. Forens. Secur. 2006
[12].   Venkatraman , s, Abraham , A . & Paprzycki M.” Significance of Steganography on Data Security “ , Proceedings of the
        International Conference on Information Technology : Coding and computing , 2004.
[13].   Fridrich , J ., Goljan M., and Hogea , D ; New Methodology for Breaking stenographic Techniques for JPEGs. “ Electronic
        Imaging 2003”.
[14].   http:/ aakash.ece.ucsb.edu./ data hiding / stegdemo.aspx.Ucsb data hiding online demonstration . Released on Mar .09,2005.




                                                                 7

Más contenido relacionado

La actualidad más candente

Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
IJRAT
 

La actualidad más candente (19)

A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSIONSECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
SECURE OMP BASED PATTERN RECOGNITION THAT SUPPORTS IMAGE COMPRESSION
 
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
Emblematical image based pattern recognition paradigm using Multi-Layer Perce...
 
M017427985
M017427985M017427985
M017427985
 
O017429398
O017429398O017429398
O017429398
 
Paper id 21201419
Paper id 21201419Paper id 21201419
Paper id 21201419
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
akashreport
akashreportakashreport
akashreport
 
Object Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet TransformObject Recogniton Based on Undecimated Wavelet Transform
Object Recogniton Based on Undecimated Wavelet Transform
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...An Approach Towards Lossless Compression Through Artificial Neural Network Te...
An Approach Towards Lossless Compression Through Artificial Neural Network Te...
 
Wavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methodsWavelet Transform based Medical Image Fusion With different fusion methods
Wavelet Transform based Medical Image Fusion With different fusion methods
 
Blank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression TechniqueBlank Background Image Lossless Compression Technique
Blank Background Image Lossless Compression Technique
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
A NEW CODING METHOD IN PATTERN RECOGNITION FINGERPRINT IMAGE USING VECTOR QUA...
 
Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA Canny Edge Detection Algorithm on FPGA
Canny Edge Detection Algorithm on FPGA
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Matlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various AlgorithmMatlab Based Image Compression Using Various Algorithm
Matlab Based Image Compression Using Various Algorithm
 

Destacado (8)

Co robić jeśli biuro podróży upadnie - poradnik
Co robić jeśli biuro podróży upadnie - poradnikCo robić jeśli biuro podróży upadnie - poradnik
Co robić jeśli biuro podróży upadnie - poradnik
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
GT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, USGT Anti-corruption legislation around the world Canada, UK, US
GT Anti-corruption legislation around the world Canada, UK, US
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Bachlelordiploma_withoutsupplements
Bachlelordiploma_withoutsupplementsBachlelordiploma_withoutsupplements
Bachlelordiploma_withoutsupplements
 
Peace is the ground beneath all struggle.
Peace is the ground beneath all struggle.Peace is the ground beneath all struggle.
Peace is the ground beneath all struggle.
 
Alfarising brochure 2012
Alfarising brochure 2012Alfarising brochure 2012
Alfarising brochure 2012
 

Similar a IJERD (www.ijerd.com) International Journal of Engineering Research and Development hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper, journal

IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
IJECEIAES
 

Similar a IJERD (www.ijerd.com) International Journal of Engineering Research and Development hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper, journal (20)

DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
A LITERATURE SURVEY ON SECURE JOINT DATA HIDING AND COMPRESSION SCHEME TO STO...
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques Survey of Hybrid Image Compression Techniques
Survey of Hybrid Image Compression Techniques
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
G017444651
G017444651G017444651
G017444651
 
An Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta SteganographyAn Infallible Method to Transfer Confidential Data using Delta Steganography
An Infallible Method to Transfer Confidential Data using Delta Steganography
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey  Wavelet based Image Coding Schemes: A Recent Survey
Wavelet based Image Coding Schemes: A Recent Survey
 
Comparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression TechniquesComparison of different Fingerprint Compression Techniques
Comparison of different Fingerprint Compression Techniques
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )International Journal on Soft Computing ( IJSC )
International Journal on Soft Computing ( IJSC )
 

Más de IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 

Más de IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development hard copy of journal, Call for Papers 2012, publishing of journal, journal of science and technology, research paper publishing, where to publish research paper, journal

  • 1. International Journal of Engineering Research and Development eISSN : 2278-067X, pISSN : 2278-800X, www.ijerd.com Volume 2, Issue 3 (July 2012), PP. 01-07 Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility 1 Kanindra Shrivastava, 2 Vinay Jain, 3 Mohan Awasthi 1,2,3 Dept. of E&TC, SSCET BHILAI, India Abstract––This paper presents a proposal for communication which is major part of daily life of today.We are living an age of science. . With the increasing communication traffic demand, data security has become very important field. Lots of data security and data hiding algorithms have been developed in the last decade. we are implementing a method of “Digital Stenography” for image data hiding. Image Steganography system allows an average user to securely transfer text messages by hiding them in a digital image file. A combination of Steganography and encryption algorithms provides a strong backbone for its security. Digital Image Steganography system features innovative techniques for hiding text in a digital image file or even using it as a key to the encryption. I. INTRODUTION The word steganography is of Greek origin and means "covered, or hidden writing". Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. Generally, a steganographic message will appear to be something else: a picture, an article, a shopping list, or some other message. A steganographic message (the plaintext) is often first encrypted by some traditional means, producing a cipher text. image steganography system is a stand-alone application that combines steganography and encryption to enhance the confidentiality of intended message. The user’s intended message is first encrypted to create unintelligible cipher text. Then the cipher text will be hidden within an image file in such a way as to minimize the perceived loss in quality. The recipient of the image is able to retrieve the hidden message back from the image with this system. The JPEG format is currently the most common format for storing image data. It is also supported by virtually all software applications that allow viewing and working with digital images Recently, several steganographic techniques for data hiding in JPEGs have been developed . II. IMAGE STEGANOGRAPGY ALGORITHM The OutGuess steganographic algorithm was proposed to counter the statistical chi-square attack . In the first pass, similar to J-Steg, OutGuess embeds message bits along a random walk into the LSBs of coefficients while skipping 0’s and 1’s. After embedding, the image is processed again using a second pass. This time, corrections are made to the coefficients to make the stego image histogram match the cover image histogram. Because the chi-square attack is based on analyzing first- order statistics of the stego image, it cannot detect messages embedded using OutGuess. Provos also reports that the corrections are made in such a manner to avoid detection using his generalized chi-square attack . In our attack on OutGuess, we use the fact that the embedding mechanism in OutGuess is overwriting the LSBs. This means that embedding another message into the stego image will partially cancel out and will thus have a different effect on the stego image than on the cover image. Outguess Proposed by Neils Provos in 2001 as a response to the ststistical chi –square attact by Andreas Westfeldin 1999. Main feature of outguess 1. outguess hides messages in JPEG files 2. It embeds hides messages in bits in LSBs of quantized DCT coefficients along a key –dependent walk through the image. a) Outguess Preserves the histogram of DCT coefficients exactly. b) Outguess cannot be detected using the chi –square attack or its generalized versions. c) Embed secret information in DCT domain. d) Modifies LSBs of DCT coefficients at random locations. e) Corrects statistical deviation by modifying unused LSBs. f) Distribution of DCT coefficients is preserved after embedding process. g) An a priori embedding capacity for an image can be determined 1
  • 2. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility Fig 1 Block diagram of Algorithm III. JPEG STEGANOGRAPHY AND ALGORITHMS 3.1 JPEG Format Strictly speaking, JPEG refers only to a family of compression algorithms; it does not refer to a specific image file format. The JPEG committee was prevented from defining a file format by turf wars within the international standards organizations. JFIF has emerged as the de-facto standard on Internet, and is what is most commonly meant by "a JPEG file. JPEG works by extracting coefficients describing 8x8 pixel blocks and then compressing these coefficients. The blocks can be revealed by saving a JPEG of a gradient pattern with the lowest possible compression quality. The blocks, which start in the upper left-hand corner, are shown in Fig. Partial blocks will be included on the right and lower edges if the dimensions are not divisible by 8 pixels Left: gradient with high quality compression Right: gradient with low quality compression Fig 2 2
  • 3. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility IV. ALGORITHM FOR ENCODING 1) The input is a Buffered Image object, which contains a Color Model and a matrix representing the image with pointers aimed at indices of the Color Model. The RGB values of the uncompressed input image are converted into three components: one luminance component and two chrominance components (YUV). The luminance component is considered more important. 2) The image is separated into 8x8 pixel blocks starting from the upper left-hand corner. 3) The component signals for each 8x8 block are transformed into the frequency domain by using the two- dimensional discrete cosine transform (DCT). This transformation is similar to the two-dimensional fast Fourier transformation. 4) While the coefficients closest to 0 are eliminated, the remaining coefficients are quantized using various degrees of accuracy. This can be modified by changing the quantization tables. The DC luminance coefficients are the most important and are quantized with the most accuracy. 5) Since the DC luminance coefficients are quantized with the most accuracy, we will hide the information inside them 6) Finally, the quantized coefficients are compressed using a Huffman encoder V. ALGORITHM FOR DECODING The decoding scheme is much simpler than encoding. The averages of the luminance of the 8x8 blocks just need to be calculated and converted back to bits. Basically what we exactly do in decoding process is:- 1) The user needs to provide a Source Image and any Keys used when the Source Image was generated. 2) If a non-default key was used in text hiding process, the receiving party must have prearranged knowledge of the key for use in retrieving the text. 3) After the Source Image and any required Keys are loaded into the application, the hidden text can be retrieved by selecting Extract Text from the Tools menu The generic process of Encoding and Decoding is demonstrated in this diagram Fig 5 VI. SYSTEM ANALYSIS 6.1 System Analysis Methodology The methodology used for System Analysis is the Object Oriented Analysis. The OOA process begins with an understanding of a manner in which the system is used by people. Once the scenario of usage is defined, the modeling of the software begins. Use Cases model the system from the end user’s point of view. The use case diagram for our system is as follows The use case achieves the following objectives: a) Define the functional and operational requirements of the system by define a scenario of usage that is agreed upon by the end user and the software engineering team. b) Provide a clear view of the system’s functionality. 3
  • 4. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility Fig. 6 Use Case Diagram 6.2 User Interface User interface consist of three main panels are Main Panel, Key Panel, & Source/Target Panel. Main Panel: The main panel of the application contains a Text tab and an Image tab as described below. Both the text and image cannot be viewed at the same time in the main panel; however, a scaled version of the image is always shown in the Source/Target pane, so both will be visible if the text tab for the main panel is selected. i) Text Tab: This is the main text area into which the user types the text to be hidden within an image. In the case of extracting text from an image, the text would be loaded into this same tab. ii) Image Tab: This tab is also located within the main panel. Its sole purpose is to display an image that has been produced as a result of embedding text within another image. Key Panel: The Key Panel will have a text key tabs that will display the selected key. The selected key will be the key the program uses. i) Text tab: The user may type directly into the text tab. He can also use Open Text Key from the Tools menu to load text as a key. The text continues to be editable once a text file has been loaded. Source/Target Panel: The Source/Target Panel shows the image that will contain hidden text, or an image, which we would like to extract text from. An image can be loaded into the Source/Target Pane either from the Image Bar via the Load Image button that will load highlighted image or through File menu ‡ Open Image File. 6.3 Activity Diagram An activity diagram is essentially a flowchart, showing flow of control from activity to activit y. It is used to model the dynamic aspects of the system. An activity is an ongoing execution in the system. Activities ultimately result in actions, which is made up of executable atomic computations that result in a change in state of the system or retur n of a value. 4
  • 5. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility Fig. 7 Activity Diagram for embedding Fig. 8 Activity Diagram for Extracting 5
  • 6. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility 6.4 Input/Output Screens . Fig.9 Login Screen Fig.10 Main Panel VII. CONCLUSION The application is primarily intended to be used to inconspicuously hide confidential and proprietary information by anyone seeking to hide information. This software has an advantage over other information security systems because the hidden text are in the form of image, which is not obvious text information carriers. Because of its user-friendly interface, the application can also be used by anyone who wants to securely transmit private information. The main advantage of this program for individuals is that they do not have to have any knowledge about steganography or encryption. The visual way to encode the text, plus the visual key makes it easy for average users to navigate within the program. To send a message, a source text, an image in which the text should be embedded, and a key are needed. The key is used to aid in encryption and to decide where the information should be hidden in the image. A short text can be used as a key. To receive a message, a source image containing the information and the corresponding key are both required. The result will appear in the text tab after decoding. The common Internet-friendly format is offered. It is inherently more difficult to hide information in a JPEG image because that is exactly what the designers of JPEG wanted to avoid: the transmission of extra information that doesn't a ffect the appearance of the image. REFERENCES [1]. Daniel L.Lau, Robert Ulichney, Gonzalo R.Arce, “Fundamental Characteristics of Halftone Textures: Blue-Noise and Green- Noise”, Image Systems Laboratory, HP Laboratories Cambridge, March 2003. [2]. C.Yang and C.Laih, “New colored visual secret sharing schemes”, Designs, Codes and Cryptography, vol.20, 2000, pp.325-335. [3]. C.Chang, C.Tsai, and T.Chen, “A new scheme for sharing secret color images in computer network”, in Proc. of International Conference on Parallel and Distributed Systems, 2000, pp. 21-27. [4]. R.L.Alder, B.P.Kitchens, M.Martens, “The mathematics of halftoning”, IBM J. Res. & Dev. Vol.47 No.1, Jan. 2003, pp. 5 -15. [5]. R.Lukac, K.N.Plantaniotis, B.Smolka, “A new approach to color image secret sharing”, EUSIPCO 2004, pp.1493-1496. [6]. H.Ancin, Anoop K.Bhattacharjya, Joseph Shu, “Improving void-and-cluster for better halftone uniformity”,International Conference on Digital Printing Technoogies. [7]. N . Provos, “Defending Against Statistical Steganography,” Proc 10th USENEX Security Symposium 2005. 6
  • 7. Multimedia Data Compression by Dynamic Dictationary Approach with Stegnography Facility [8]. N . Provos and P. Honeyman, “Hide and Seek: An introduction to Steganography,” IEEE Security & Privacy Journal 2003. [9]. S . Katzenbeisser and Petitcolas , ”Information Hiding Techniques for Stenography and Digital watermaking” Artech House, Norwood, MA. 2000 . [10]. L. Reyzen And S. Russell , “More efficient provably secure Steganography” 2007. [11]. S.Lyu and H. Farid , “Steganography using higher order image statistics , “ IEEE Trans. Inf. Forens. Secur. 2006 [12]. Venkatraman , s, Abraham , A . & Paprzycki M.” Significance of Steganography on Data Security “ , Proceedings of the International Conference on Information Technology : Coding and computing , 2004. [13]. Fridrich , J ., Goljan M., and Hogea , D ; New Methodology for Breaking stenographic Techniques for JPEGs. “ Electronic Imaging 2003”. [14]. http:/ aakash.ece.ucsb.edu./ data hiding / stegdemo.aspx.Ucsb data hiding online demonstration . Released on Mar .09,2005. 7