10 research outputs found

    An Efficient Light-weight LSB steganography with Deep learning Steganalysis

    Full text link
    Active research is going on to securely transmit a secret message or so-called steganography by using data-hiding techniques in digital images. After assessing the state-of-the-art research work, we found, most of the existing solutions are not promising and are ineffective against machine learning-based steganalysis. In this paper, a lightweight steganography scheme is presented through graphical key embedding and obfuscation of data through encryption. By keeping a mindset of industrial applicability, to show the effectiveness of the proposed scheme, we emphasized mainly deep learning-based steganalysis. The proposed steganography algorithm containing two schemes withstands not only statistical pattern recognizers but also machine learning steganalysis through feature extraction using a well-known pre-trained deep learning network Xception. We provided a detailed protocol of the algorithm for different scenarios and implementation details. Furthermore, different performance metrics are also evaluated with statistical and machine learning performance analysis. The results were quite impressive with respect to the state of the arts. We received 2.55% accuracy through statistical steganalysis and machine learning steganalysis gave maximum of 49.93~50% correctly classified instances in good condition.Comment: Accepted pape

    MatlabSimulink Model of Sinusoidal PWM For Three-Phase Voltage Source Inverter

    No full text

    Spread spectrum RADAR using RAKE receiver

    No full text

    Development and analysis of IWT-SVD and DWT-SVD steganography using fractal cover

    No full text
    The assurance of secret data transmitted over the Internet and confining its access to explicit grouped information has become a significant security and protection issue. To hide the presence of such information, a robust and blind color image steganography algorithm, using fractal cover images, Singular Value Decomposition (SVD), Integer Wavelet Transform (IWT), and Discrete Wavelet Transform (DWT) is proposed in this paper. The proposed algorithm conceals the color secret image intelligently inside a fractal cover image thus creating a unique stego-image that is virtually a replica of the original cover image. The novelty of this proposed blind image hiding method lies in the fact that a small file size of a unique fractal image can be used to conceal a large amount of information payload. The fractal cover images can be implemented without debasing its quality to make the shrouded information sufficiently strong against image processing attacks. The algorithm possesses features like robustness, imperceptibility, security, and greater hiding capacity due to the application of fractal compression, DWT-SVD, and IWT-SVD hybrid transform schemes. The secret image is inserted in U and V components of the fractal cover with a scaling factor based on the HVS model and a stego-image with sufficiently large keyspace is created. Furthermore, the proposed work compares the performance analysis and security offered by IWT- SVD and DWT- SVD hybrid combinations for different fractal covers using certain metrics like PSNR (Peak Signal to Noise Ratio), MSE (Mean Square Error), SSIM (Structural Similarity Index), BRISQUE (Blind/ Reference less Image Spatial Quality Evaluator) score and Bits per pixel (BPP). The results prove that image degradation is very less (less than 0.6%) in the proposed algorithm even when the secret image file size is more than double the file size of the fractal cover image which also saves the bandwidth and storage requirements

    FPGA based Ultra-Wideband pseudo-noise radar

    Full text link

    An Insight into Image Steganography for Medical Informatics

    No full text

    Securing Criminal Records using R-Pi, QR code and Steganography

    Full text link
    In today`s digital scenario it has become very essential to maintain secrecy of criminal records otherwise forgery could happen. Using steganography it is possible to provide security for the information which is communicated over the internet from one crime branch to the other. Steganography one of the emerging security fields works to mask the very existence of the message. A wide range of carrier file formats can be utilized, but digital steganography is the extremely beneficial data hiding technique to secure criminal image as well as the crime scene images. Various applications have various prerequisites of the steganography method utilized. In this paper, we proposed CRSS (Criminal Record Security System) an image steganography method with LSB and RSA technique for enhanced security and along with that Raspberry pi and GSM module is used. Thus, for a more secure approach, the proposed method hides the criminal`s confidential records such as criminal`s image, crime scene digital images etc. using LSB steganography and also encrypts the confidential data making use of a private key using RSA algorithm and then sends it to the desired end. The receiver then decrypts the confidential data to get the original criminal information. CRSS is also proposed to send a QR code to the receiver which hides sensitive data and may include criminal`s previous crime history and other written proofs which are scanned at the receiving end reveals the entire criminal record. The entire system is implemented on Raspberry Pi 3 processor and thus a secure transmission of data without traditional desktop dependency in a more economical way could be established.</jats:p

    A Review Paper on Internet of Things and it’s Applications

    No full text
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a meaningful purpose. In this paper we discussed IoT and its architecture. Further we explained different applications of IoT for users, IoT advantages and disadvantages
    corecore