Kamaldeep Joshi | Maharshi Dayanand University (original) (raw)

Papers by Kamaldeep Joshi

Research paper thumbnail of Opinion Mining and Analysing Real-Time Tweets Using RapidMiner

Advances in Intelligent Systems and Computing

Research paper thumbnail of Pixel Indicator Steganography Technique with Enhanced Capacity for RGB Images

2019 International Conference on Intelligent Computing and Control Systems (ICCS)

In the modern era, a lot of information is transferred over the internet. This information has to... more In the modern era, a lot of information is transferred over the internet. This information has to be transferred securely to retain privacy. Many techniques have been developed so that this information is transferred securely without being intercepted by the third party. Steganography is also such techniques in which information can be transferred securely. In steganography, the existence of secure information is completely hidden from the third party. Only sender and receiver know that about the secret information being transferred. In steganography, information is embedded into some cover medium like text, image, audio or video etc. In image steganography, the image is used as a cover medium to hide the secret data. Most common technique for image steganography involves least significant bits (LSB) of image pixels which are altered with the secret message bits. There are a lot of limitations in the LSB techniques, due to which many new image steganography techniques are developed. Pixel Indicator Technique is such a technique. In this paper, an altered version of the PIT is presented in which advantage of 24 bits of each pixel is taken to hide the data in three data channels of RGB. In this method, no separate key is used for encryption and decryption, thus avoiding any overhead of managing key. This technique provides enhanced capacity and security over any other image steganography techniques.

Research paper thumbnail of Lung Cancer Detection by using Adam Algorithm and Convolutional Neural Network

Lung cancer, also known as lung carcinoma is one of the main reasons of casualty among people all... more Lung cancer, also known as lung carcinoma is one of the main reasons of casualty among people all over the world. The chance of survival rates among people can increase if lung cancer is detected at an early stage. As per current survival rate, only 14% patients can survive for 5 years. It can be increased by 35% and make survival rate nearly 50% if the disease is detected in her early stage. This is only possible with effective screening test to detect the lung cancer. Many techniques such as filtering, image thresholding, histogram equalization based on image pre-processing and Gray Level Co-occurrence Matrix (GLCM) techniques based on feature extraction are used for detection of the this disease. But to reduce the mortality from lung cancer a fast, accurate and effective screening test is required for early stage detection of the target disease. The proposed approach using Adam algorithm and Convolutional neural network on CT scan images is among best solution.

Research paper thumbnail of Phishing URL Detection Using Machine Learning

Phishing attack is used to obtain the information like username, password, bank account details, ... more Phishing attack is used to obtain the information like username, password, bank account details, and credit card details. It is a most popular cybercrime today. Phishing attacks also affect the online payment sector financial institution, file hosting or cloud storage, and many others. Phishing attack always targets to these Web sites which are related to the online payment sector and Web mail. Many techniques are used to prevent the phishing attack like blacklist, Heuristic, visual similarity, and machine learning. Blacklist technique is most commonly used because it is easy to implement, but this technique cannot detect a new phishing attack. So, now, machine learning is most efficient technique to detect the phishing attack and this technique is able to detect all drawback of other phishing detect techniques. So this research work is completely based on machine learning algorithms which are logistic regression, decision tree, random forest, and SVM to detect phishing Web site. In...

Research paper thumbnail of Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016

Image steganography is the best aspect of information hiding. In this, the information is hidden ... more Image steganography is the best aspect of information hiding. In this, the information is hidden within an image and the image travels openly on the Internet. The Least Significant Bit (LSB) is one of the most popular methods of image steganography. In this method, the information bit is hidden at the LSB of the image pixel. In one bit LSB steganography method, the total numbers of the pixels and the total number of message bits are equal to each other. In this paper, the LSB method of image steganography is used for watermarking. The watermarking is an application of the steganography. The watermark contains 80*88 pixels and each pixel requirs 8 bits for its binary equivalent form so, the total number of bits required to hide the watermark are 80*88*8(56320). The experiment was performed on standard 256*256 and 512*512 size images. After the watermark insertion, histogram analysis was performed. A noise factor (salt and pepper) of 0.02 was added to the stego image in order to evalu...

Research paper thumbnail of Image Steganography: A Conceptual Study of Different Techniques

Journal of emerging technologies and innovative research, 2018

In the era of internet, a large number of important files is shared through the internet. These f... more In the era of internet, a large number of important files is shared through the internet. These files are of great significance from the point of view of privacy. So proper security is needed in order to achieve the secure transfer of files, many different techniques are used so that data in these files can’t be intercepted by the third party. To achieve security, different technologies like cryptography and steganography are used. In cryptography, information is encrypted but its existence is not hidden. But in Steganography, the existence of secure information is also hidden. Steganography is the novel and decent technique of embedding important secret information in the cover medium like text, audio, video etc. The main use of steganography is to hide the important information as well as its existence from the third party. This paper discusses image steganography and various techniques used in image steganography. In image steganography, to achieve the secure transfer of informat...

Research paper thumbnail of A LL Subband Based Digital Watermarking in DWT

International Journal of Engineering and Manufacturing, 2017

Digital watermarking is a technique which allows an individual to add hidden copyright notices or... more Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, image and documents in such a way that the watermark cannot be removed against different attacks. Digital Watermarking is a process to prevent the unauthorized access and modification of data. It ensures that the communication between two parties’ remains secure. Digital watermarking can be performed in spatial and frequency domain. In the spatial domain, the watermark is embedded in the very existence of the pixel. In frequency domain, the transformation of any kind is applied and then information is embedded. In this paper, we proposed an approach to watermarking in frequency domain using DWT technique. The gray scale host image is divided into four sub bands: LL, HL, LH, HH and the watermark are inserted in the LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band...

Research paper thumbnail of A Analysis of LSB Technique in Video Steganography using PSNR and MSE

International Journal of Advanced Research in Computer Science, 2017

Security of data is always needed whenever communication is done and to achieve that purpose diff... more Security of data is always needed whenever communication is done and to achieve that purpose different techniques are used so that data should not be attacked by the third party. Different data concealing techniques like cryptography, watermarking etc. are used. But if we want the intruder not to even know about the presence of secret data we have to use the Steganography Technique. And this technique can be applied by using different files like text, audio, video etc. One of the steganography types as video steganography used to hide the secret data in an easy manner due to the complexity of its structure. We have different types of methods based upon Format, Cover, and Frequency in video steganography. This paper provides a review and analysis of the video steganography technique applied to AVI video file with LSB technique and the comparison of frames in the video file is analyzed with the help of different parameters to find how similar the cover video frame after embedding the ...

Research paper thumbnail of Statistical Deformity in Steganogrpahy and its Overcomings

Journal of emerging technologies and innovative research, 2018

Data Protection is important now days but most pivotal is to protect the medium through which dat... more Data Protection is important now days but most pivotal is to protect the medium through which data can be transfer from one point to another. To work upon it many different techniques are designed and implemented one of the techniques is Steganography . Steganography originates from greek word which means covered writing / or concealing information with other non secret text [Wikipedia]. Later on research different sub techniques of Steganography presented like Image, Audio, Text, Video etc. which uses different embedding mechanism to embed secret data in secure medium to prevent it from intruder. The first process tries to overcome the Targeted Steganalytic Attacks. This paper discusses Statistical properties of Steganography. Whenever message embed in a medium its properties changes and the resulted stego image will not be same as parent image . The work mainly revolve around first order statistics based targeted attacks. This paper proposes algorithm which can preserve image afte...

Research paper thumbnail of An Additive Watermarking Technique in Gray Scale Images Using Discrete Wavelet Transformation and Its Analysis on Watermark Strength

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016

Abstract—Digital Watermarking is a procedure to prevent the unauthorized access and modification ... more Abstract—Digital Watermarking is a procedure to prevent the unauthorized access and modification of personal data. It assures that the communication between two parties remains secure and their communication should be undetected. This paper investigates the consequence of the watermark strength of the grayscale image using a Discrete Wavelet Transformation (DWT) additive technique. In this method, the gray scale host image is divided into four sub bands: LL (Low-Low), HL (High-Low), LH (Low-High), HH (High-High) and the watermark is inserted in an LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band has been inserted and the results are discussed. LL represents the average component of the host image which contains the maximum information of the image. Two kinds of experiments are performed. In the first, the same watermark is embedded in different images and in the later on the strength of the watermark varies by...

Research paper thumbnail of Review of vital techniques for hiding confidential data using image steganography

Journal of emerging technologies and innovative research, 2018

The quick advancement in the exchange of information through internet made it easier to exchange ... more The quick advancement in the exchange of information through internet made it easier to exchange information exact and faster to the receiver. Security of data is one of the huge components of information technology and communication. Steganography is a term used for information hiding and it is an art of hidden writing. In steganography we hide information with a multimedia carrier i.e. image, text, audio, video files, etc. So, that observer cannot find the hidden information which we want to send to the receiver. Steganography main objective is to provide robustness, detectability, capacity of hidden data due to which it differs from other techniques such as watermarking and cryptography. This paper proposes a various technique used to hide information on image by an image steganography. In image steganography we hide our secret data in image so that the observer cannot feel its existence. Image steganography strategies are as of late been useful to send any secret message in the ...

Research paper thumbnail of A Review on Different Image Steganography Techniques

In this era of Internet, many useful files are shared through internet. For this we need a secure... more In this era of Internet, many useful files are shared through internet. For this we need a secure system to protect our secret data from eavesdroppers. Two different technologies are used to make our information secure i.e. cryptography and steganography. In cryptography we do encryption of the secret message but we can’t hide the existence of the secret message. But in steganography we hide the existence of the secret message. Steganography is the art which help us to hide secret information in different multimedia files. As a result, unauthorized users are not able to see and recognize the hidden information. It is a science that manages a secret path for sending information secretly using different multimedia carrier like in image, text, audio and video file. This Paper includes image Steganography, its basic working and insertion techniques used in Image Steganography such as LSB, Chaotic, GLM, Parity checking and Interpolation. It also involves Steganography applications and a ...

Research paper thumbnail of Enhancing Network Security for Image Steganography by Splitting Graphical Matrix

The proposed work has focused on the security of image in order to save it from external attacks.... more The proposed work has focused on the security of image in order to save it from external attacks. However there have been several existing steganography mechanisms to secure the graphical contents but there are still threats from external attacks. Moreover in case of bulky image it becomes difficult to shift content over network without any loss. Thus proposed work has been introduced to allow graphical splitter mechanism to break graphical content in multiple parts by splitting image matrix in two or multiple parts according to image size. If the image size is less bulky, it could be split into just two parts or if the image size is more bulky, it could be split into more than two or multiple parts. This would save the image from being hacked or read in unauthentic manner. The proposed work would apply a key to divide image matrix in two or more than two parts so that it could not be easily understood. The proposed work is also concentrated on Threats to security, Nature of attacks...

Research paper thumbnail of An Adapted Approach of Image Steganography Using Pixel Mutation and Bit Augmentation

Smart Computing Techniques and Applications

Research paper thumbnail of Steganographic Method Based on Interpolation and Cyclic LSB Substitution of Digital Images

Lecture Notes in Electrical Engineering

In the era of the Internet, many files (text, image, audio, and video) are shared through the Int... more In the era of the Internet, many files (text, image, audio, and video) are shared through the Internet. Security is the main issue, during sharing information. To resolve the security problem, two techniques are used to make our information secure, i.e., cryptography and steganography. Cryptography is used for encryption but does not hide the information. So, it is not too much secure. The emerging Internet technology has led to the need for a high level of security which is provided by steganography. Steganography is used to hide the existence of a secret message. As a result, unauthorized users cannot access secret information in different multimedia files. This paper gives a brief overview of steganography, type of steganography, insertion technique used in image steganography search such as LSB, GLM, parity checking, and interpolation. It also includes the application and a set of parameters to test the imperceptibility of an algorithm. In image steganography, the cover medium used for hiding data is an image. The most common technique for image steganography involves the least significant bits (LSBs) of image pixels which are altered with the bits of secret message. There are a lot of limitations in the LSB techniques, due to which many new image steganography techniques are developed. The cyclic LSB technique is such a technique. In this paper, an altered version of the cyclic LSB technique is presented. The advantage of this method is that RGB channels of the image are rotated into the cycle, i.e., red channel is used for hiding first bit, the green channel is used for hiding the second bit, the blue channel is used for hiding third bits, and then this cycle is repeated. In this method, no separate key is used for encryption and decryption, thus avoiding any overhead of managing key. This technique provides enhanced capacity and security over any other image steganography techniques.

Research paper thumbnail of New approach toward data hiding using XOR for image steganography

2016 Ninth International Conference on Contemporary Computing (IC3)

With the growth in internet usage, there is a proportional growth in security and privacy demands... more With the growth in internet usage, there is a proportional growth in security and privacy demands. In this paper, a three bit XOR steganography system for concealing messages into gray Images is projected. In this method, last three bits of pixel value offer 100 percentage of message addition. This new technique uses the XOR operation between the message and original image. If the intruder extracts the last three bits, he would not be able to find the meaning of the message as the message is in decoded form. The maximum no of bit which is to be hidden using this method is equal to the R∗C∗3, where R and C is the rows and column of the image. The time complexity is also calculated which is equal to O(1). Later on the method is analysed on the bases of PSNR, MSE, L2RAT and MAXERR. The projected technique is also matched with other similar techniques to show the superiority.

Research paper thumbnail of Role of nanotechnology behind the success of mRNA vaccines for COVID-19

Research paper thumbnail of A Survey and Comparison of Some of the Most Prominent QKD Protocols

SSRN Electronic Journal

Classical Cryptographic systems security relies on the complexity of mathematical problems and li... more Classical Cryptographic systems security relies on the complexity of mathematical problems and limited computational power available at the attacker's end. But with the advent of quantum computers that are assumed to have unlimited computational capability, classical cryptography is now proved to be no more unconditionally secure. It has been proved that the security of a cryptographic system depends on the key used for encryption, not the algorithm. Quantum Key Distribution (QKD) is a key sharing mechanism between two parties whose security relies on the very laws of nature (quantum mechanics), not on the computational capability of the eavesdropper. In QKD, if an eavesdropper tries to gain key information, then he will be detected immediately, and the key sharing procedure is aborted. In this paper, we will survey some of the most prominent QKD protocols proposed till now, and then we will perform a comparative analysis on those protocols depending on various factors.

Research paper thumbnail of Nanoceria as a possible agent for the management of COVID-19

Research paper thumbnail of Honeynetbased Defensive mechanism Against DDoS Attacks

Internet we are using today is expanding faster than we could have imagined. Since the dawn of th... more Internet we are using today is expanding faster than we could have imagined. Since the dawn of the Internet, there has been an exponential increase in the number of web sites and so the quantity of data on these websites. The hackers attack the web sites to collect useful information and also to make other legitimate users devoid of the information or services they required. Such problems and other similar types of attacks can be handled by "Honeypot" system which takes all attacks on itself and studies the attack patterns to detect similar kind of attacks in future.Honeypots allow all the attacks on itself and make attackers think that they have the access of real system and meanwhile honeypots will study all the attack pattern of attackers. The authors have created a network of various Honeypots to enhance the efficiency. Before honeypots, a filtering algorithm is used which with the help of pre-defined sink server will predict whether a given packet is malicious or not,...

Research paper thumbnail of Opinion Mining and Analysing Real-Time Tweets Using RapidMiner

Advances in Intelligent Systems and Computing

Research paper thumbnail of Pixel Indicator Steganography Technique with Enhanced Capacity for RGB Images

2019 International Conference on Intelligent Computing and Control Systems (ICCS)

In the modern era, a lot of information is transferred over the internet. This information has to... more In the modern era, a lot of information is transferred over the internet. This information has to be transferred securely to retain privacy. Many techniques have been developed so that this information is transferred securely without being intercepted by the third party. Steganography is also such techniques in which information can be transferred securely. In steganography, the existence of secure information is completely hidden from the third party. Only sender and receiver know that about the secret information being transferred. In steganography, information is embedded into some cover medium like text, image, audio or video etc. In image steganography, the image is used as a cover medium to hide the secret data. Most common technique for image steganography involves least significant bits (LSB) of image pixels which are altered with the secret message bits. There are a lot of limitations in the LSB techniques, due to which many new image steganography techniques are developed. Pixel Indicator Technique is such a technique. In this paper, an altered version of the PIT is presented in which advantage of 24 bits of each pixel is taken to hide the data in three data channels of RGB. In this method, no separate key is used for encryption and decryption, thus avoiding any overhead of managing key. This technique provides enhanced capacity and security over any other image steganography techniques.

Research paper thumbnail of Lung Cancer Detection by using Adam Algorithm and Convolutional Neural Network

Lung cancer, also known as lung carcinoma is one of the main reasons of casualty among people all... more Lung cancer, also known as lung carcinoma is one of the main reasons of casualty among people all over the world. The chance of survival rates among people can increase if lung cancer is detected at an early stage. As per current survival rate, only 14% patients can survive for 5 years. It can be increased by 35% and make survival rate nearly 50% if the disease is detected in her early stage. This is only possible with effective screening test to detect the lung cancer. Many techniques such as filtering, image thresholding, histogram equalization based on image pre-processing and Gray Level Co-occurrence Matrix (GLCM) techniques based on feature extraction are used for detection of the this disease. But to reduce the mortality from lung cancer a fast, accurate and effective screening test is required for early stage detection of the target disease. The proposed approach using Adam algorithm and Convolutional neural network on CT scan images is among best solution.

Research paper thumbnail of Phishing URL Detection Using Machine Learning

Phishing attack is used to obtain the information like username, password, bank account details, ... more Phishing attack is used to obtain the information like username, password, bank account details, and credit card details. It is a most popular cybercrime today. Phishing attacks also affect the online payment sector financial institution, file hosting or cloud storage, and many others. Phishing attack always targets to these Web sites which are related to the online payment sector and Web mail. Many techniques are used to prevent the phishing attack like blacklist, Heuristic, visual similarity, and machine learning. Blacklist technique is most commonly used because it is easy to implement, but this technique cannot detect a new phishing attack. So, now, machine learning is most efficient technique to detect the phishing attack and this technique is able to detect all drawback of other phishing detect techniques. So this research work is completely based on machine learning algorithms which are logistic regression, decision tree, random forest, and SVM to detect phishing Web site. In...

Research paper thumbnail of Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016

Image steganography is the best aspect of information hiding. In this, the information is hidden ... more Image steganography is the best aspect of information hiding. In this, the information is hidden within an image and the image travels openly on the Internet. The Least Significant Bit (LSB) is one of the most popular methods of image steganography. In this method, the information bit is hidden at the LSB of the image pixel. In one bit LSB steganography method, the total numbers of the pixels and the total number of message bits are equal to each other. In this paper, the LSB method of image steganography is used for watermarking. The watermarking is an application of the steganography. The watermark contains 80*88 pixels and each pixel requirs 8 bits for its binary equivalent form so, the total number of bits required to hide the watermark are 80*88*8(56320). The experiment was performed on standard 256*256 and 512*512 size images. After the watermark insertion, histogram analysis was performed. A noise factor (salt and pepper) of 0.02 was added to the stego image in order to evalu...

Research paper thumbnail of Image Steganography: A Conceptual Study of Different Techniques

Journal of emerging technologies and innovative research, 2018

In the era of internet, a large number of important files is shared through the internet. These f... more In the era of internet, a large number of important files is shared through the internet. These files are of great significance from the point of view of privacy. So proper security is needed in order to achieve the secure transfer of files, many different techniques are used so that data in these files can’t be intercepted by the third party. To achieve security, different technologies like cryptography and steganography are used. In cryptography, information is encrypted but its existence is not hidden. But in Steganography, the existence of secure information is also hidden. Steganography is the novel and decent technique of embedding important secret information in the cover medium like text, audio, video etc. The main use of steganography is to hide the important information as well as its existence from the third party. This paper discusses image steganography and various techniques used in image steganography. In image steganography, to achieve the secure transfer of informat...

Research paper thumbnail of A LL Subband Based Digital Watermarking in DWT

International Journal of Engineering and Manufacturing, 2017

Digital watermarking is a technique which allows an individual to add hidden copyright notices or... more Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, image and documents in such a way that the watermark cannot be removed against different attacks. Digital Watermarking is a process to prevent the unauthorized access and modification of data. It ensures that the communication between two parties’ remains secure. Digital watermarking can be performed in spatial and frequency domain. In the spatial domain, the watermark is embedded in the very existence of the pixel. In frequency domain, the transformation of any kind is applied and then information is embedded. In this paper, we proposed an approach to watermarking in frequency domain using DWT technique. The gray scale host image is divided into four sub bands: LL, HL, LH, HH and the watermark are inserted in the LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band...

Research paper thumbnail of A Analysis of LSB Technique in Video Steganography using PSNR and MSE

International Journal of Advanced Research in Computer Science, 2017

Security of data is always needed whenever communication is done and to achieve that purpose diff... more Security of data is always needed whenever communication is done and to achieve that purpose different techniques are used so that data should not be attacked by the third party. Different data concealing techniques like cryptography, watermarking etc. are used. But if we want the intruder not to even know about the presence of secret data we have to use the Steganography Technique. And this technique can be applied by using different files like text, audio, video etc. One of the steganography types as video steganography used to hide the secret data in an easy manner due to the complexity of its structure. We have different types of methods based upon Format, Cover, and Frequency in video steganography. This paper provides a review and analysis of the video steganography technique applied to AVI video file with LSB technique and the comparison of frames in the video file is analyzed with the help of different parameters to find how similar the cover video frame after embedding the ...

Research paper thumbnail of Statistical Deformity in Steganogrpahy and its Overcomings

Journal of emerging technologies and innovative research, 2018

Data Protection is important now days but most pivotal is to protect the medium through which dat... more Data Protection is important now days but most pivotal is to protect the medium through which data can be transfer from one point to another. To work upon it many different techniques are designed and implemented one of the techniques is Steganography . Steganography originates from greek word which means covered writing / or concealing information with other non secret text [Wikipedia]. Later on research different sub techniques of Steganography presented like Image, Audio, Text, Video etc. which uses different embedding mechanism to embed secret data in secure medium to prevent it from intruder. The first process tries to overcome the Targeted Steganalytic Attacks. This paper discusses Statistical properties of Steganography. Whenever message embed in a medium its properties changes and the resulted stego image will not be same as parent image . The work mainly revolve around first order statistics based targeted attacks. This paper proposes algorithm which can preserve image afte...

Research paper thumbnail of An Additive Watermarking Technique in Gray Scale Images Using Discrete Wavelet Transformation and Its Analysis on Watermark Strength

World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 2016

Abstract—Digital Watermarking is a procedure to prevent the unauthorized access and modification ... more Abstract—Digital Watermarking is a procedure to prevent the unauthorized access and modification of personal data. It assures that the communication between two parties remains secure and their communication should be undetected. This paper investigates the consequence of the watermark strength of the grayscale image using a Discrete Wavelet Transformation (DWT) additive technique. In this method, the gray scale host image is divided into four sub bands: LL (Low-Low), HL (High-Low), LH (Low-High), HH (High-High) and the watermark is inserted in an LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band has been inserted and the results are discussed. LL represents the average component of the host image which contains the maximum information of the image. Two kinds of experiments are performed. In the first, the same watermark is embedded in different images and in the later on the strength of the watermark varies by...

Research paper thumbnail of Review of vital techniques for hiding confidential data using image steganography

Journal of emerging technologies and innovative research, 2018

The quick advancement in the exchange of information through internet made it easier to exchange ... more The quick advancement in the exchange of information through internet made it easier to exchange information exact and faster to the receiver. Security of data is one of the huge components of information technology and communication. Steganography is a term used for information hiding and it is an art of hidden writing. In steganography we hide information with a multimedia carrier i.e. image, text, audio, video files, etc. So, that observer cannot find the hidden information which we want to send to the receiver. Steganography main objective is to provide robustness, detectability, capacity of hidden data due to which it differs from other techniques such as watermarking and cryptography. This paper proposes a various technique used to hide information on image by an image steganography. In image steganography we hide our secret data in image so that the observer cannot feel its existence. Image steganography strategies are as of late been useful to send any secret message in the ...

Research paper thumbnail of A Review on Different Image Steganography Techniques

In this era of Internet, many useful files are shared through internet. For this we need a secure... more In this era of Internet, many useful files are shared through internet. For this we need a secure system to protect our secret data from eavesdroppers. Two different technologies are used to make our information secure i.e. cryptography and steganography. In cryptography we do encryption of the secret message but we can’t hide the existence of the secret message. But in steganography we hide the existence of the secret message. Steganography is the art which help us to hide secret information in different multimedia files. As a result, unauthorized users are not able to see and recognize the hidden information. It is a science that manages a secret path for sending information secretly using different multimedia carrier like in image, text, audio and video file. This Paper includes image Steganography, its basic working and insertion techniques used in Image Steganography such as LSB, Chaotic, GLM, Parity checking and Interpolation. It also involves Steganography applications and a ...

Research paper thumbnail of Enhancing Network Security for Image Steganography by Splitting Graphical Matrix

The proposed work has focused on the security of image in order to save it from external attacks.... more The proposed work has focused on the security of image in order to save it from external attacks. However there have been several existing steganography mechanisms to secure the graphical contents but there are still threats from external attacks. Moreover in case of bulky image it becomes difficult to shift content over network without any loss. Thus proposed work has been introduced to allow graphical splitter mechanism to break graphical content in multiple parts by splitting image matrix in two or multiple parts according to image size. If the image size is less bulky, it could be split into just two parts or if the image size is more bulky, it could be split into more than two or multiple parts. This would save the image from being hacked or read in unauthentic manner. The proposed work would apply a key to divide image matrix in two or more than two parts so that it could not be easily understood. The proposed work is also concentrated on Threats to security, Nature of attacks...

Research paper thumbnail of An Adapted Approach of Image Steganography Using Pixel Mutation and Bit Augmentation

Smart Computing Techniques and Applications

Research paper thumbnail of Steganographic Method Based on Interpolation and Cyclic LSB Substitution of Digital Images

Lecture Notes in Electrical Engineering

In the era of the Internet, many files (text, image, audio, and video) are shared through the Int... more In the era of the Internet, many files (text, image, audio, and video) are shared through the Internet. Security is the main issue, during sharing information. To resolve the security problem, two techniques are used to make our information secure, i.e., cryptography and steganography. Cryptography is used for encryption but does not hide the information. So, it is not too much secure. The emerging Internet technology has led to the need for a high level of security which is provided by steganography. Steganography is used to hide the existence of a secret message. As a result, unauthorized users cannot access secret information in different multimedia files. This paper gives a brief overview of steganography, type of steganography, insertion technique used in image steganography search such as LSB, GLM, parity checking, and interpolation. It also includes the application and a set of parameters to test the imperceptibility of an algorithm. In image steganography, the cover medium used for hiding data is an image. The most common technique for image steganography involves the least significant bits (LSBs) of image pixels which are altered with the bits of secret message. There are a lot of limitations in the LSB techniques, due to which many new image steganography techniques are developed. The cyclic LSB technique is such a technique. In this paper, an altered version of the cyclic LSB technique is presented. The advantage of this method is that RGB channels of the image are rotated into the cycle, i.e., red channel is used for hiding first bit, the green channel is used for hiding the second bit, the blue channel is used for hiding third bits, and then this cycle is repeated. In this method, no separate key is used for encryption and decryption, thus avoiding any overhead of managing key. This technique provides enhanced capacity and security over any other image steganography techniques.

Research paper thumbnail of New approach toward data hiding using XOR for image steganography

2016 Ninth International Conference on Contemporary Computing (IC3)

With the growth in internet usage, there is a proportional growth in security and privacy demands... more With the growth in internet usage, there is a proportional growth in security and privacy demands. In this paper, a three bit XOR steganography system for concealing messages into gray Images is projected. In this method, last three bits of pixel value offer 100 percentage of message addition. This new technique uses the XOR operation between the message and original image. If the intruder extracts the last three bits, he would not be able to find the meaning of the message as the message is in decoded form. The maximum no of bit which is to be hidden using this method is equal to the R∗C∗3, where R and C is the rows and column of the image. The time complexity is also calculated which is equal to O(1). Later on the method is analysed on the bases of PSNR, MSE, L2RAT and MAXERR. The projected technique is also matched with other similar techniques to show the superiority.

Research paper thumbnail of Role of nanotechnology behind the success of mRNA vaccines for COVID-19

Research paper thumbnail of A Survey and Comparison of Some of the Most Prominent QKD Protocols

SSRN Electronic Journal

Classical Cryptographic systems security relies on the complexity of mathematical problems and li... more Classical Cryptographic systems security relies on the complexity of mathematical problems and limited computational power available at the attacker's end. But with the advent of quantum computers that are assumed to have unlimited computational capability, classical cryptography is now proved to be no more unconditionally secure. It has been proved that the security of a cryptographic system depends on the key used for encryption, not the algorithm. Quantum Key Distribution (QKD) is a key sharing mechanism between two parties whose security relies on the very laws of nature (quantum mechanics), not on the computational capability of the eavesdropper. In QKD, if an eavesdropper tries to gain key information, then he will be detected immediately, and the key sharing procedure is aborted. In this paper, we will survey some of the most prominent QKD protocols proposed till now, and then we will perform a comparative analysis on those protocols depending on various factors.

Research paper thumbnail of Nanoceria as a possible agent for the management of COVID-19

Research paper thumbnail of Honeynetbased Defensive mechanism Against DDoS Attacks

Internet we are using today is expanding faster than we could have imagined. Since the dawn of th... more Internet we are using today is expanding faster than we could have imagined. Since the dawn of the Internet, there has been an exponential increase in the number of web sites and so the quantity of data on these websites. The hackers attack the web sites to collect useful information and also to make other legitimate users devoid of the information or services they required. Such problems and other similar types of attacks can be handled by "Honeypot" system which takes all attacks on itself and studies the attack patterns to detect similar kind of attacks in future.Honeypots allow all the attacks on itself and make attackers think that they have the access of real system and meanwhile honeypots will study all the attack pattern of attackers. The authors have created a network of various Honeypots to enhance the efficiency. Before honeypots, a filtering algorithm is used which with the help of pre-defined sink server will predict whether a given packet is malicious or not,...