6 research outputs found

    VLSI Implementation of Reversible Watermarking using RCM

    Get PDF
    In this paper the design and implementation of image watermarking algorithm called reversible contrast mapping (RCM) is given. Watermarking is to embed the one important information into the cover media to provide the security to data. Reversible watermarking is one of the important scheme of the watermarking which is useful when reconstruction of original image from watermarked data is necessary after using it like medical and military images. We have used reversible contrast mapping (RCM) algorithm for inserting watermark of size 64Ă—64 in original image of size 128 128. It is integer transform applied on pixel pairs. It gives high embedding rate at lower mathematical complexity and it does not require data compression with lowest complexity. DOI: 10.17762/ijritcc2321-8169.15054

    An improved image steganography scheme based on distinction grade value and secret message encryption

    Get PDF
    Steganography is an emerging and greatly demanding technique for secure information communication over the internet using a secret cover object. It can be used for a wide range of applications such as safe circulation of secret data in intelligence, industry, health care, habitat, online voting, mobile banking and military. Commonly, digital images are used as covers for the steganography owing to their redundancy in the representation, making them hidden to the intruders, hackers, adversaries, unauthorized users. Still, any steganography system launched over the Internet can be cracked upon recognizing the stego cover. Thus, the undetectability that involves data imperceptibility or concealment and security is the significant trait of any steganography system. Presently, the design and development of an effective image steganography system are facing several challenges including low capacity, poor robustness and imperceptibility. To surmount such limitations, it is important to improve the capacity and security of the steganography system while maintaining a high signal-to-noise ratio (PSNR). Based on these factors, this study is aimed to design and develop a distinction grade value (DGV) method to effectively embed the secret data into a cover image for achieving a robust steganography scheme. The design and implementation of the proposed scheme involved three phases. First, a new encryption method called the shuffle the segments of secret message (SSSM) was incorporated with an enhanced Huffman compression algorithm to improve the text security and payload capacity of the scheme. Second, the Fibonacci-based image transformation decomposition method was used to extend the pixel's bit from 8 to 12 for improving the robustness of the scheme. Third, an improved embedding method was utilized by integrating a random block/pixel selection with the DGV and implicit secret key generation for enhancing the imperceptibility of the scheme. The performance of the proposed scheme was assessed experimentally to determine the imperceptibility, security, robustness and capacity. The standard USC-SIPI images dataset were used as the benchmarking for the performance evaluation and comparison of the proposed scheme with the previous works. The resistance of the proposed scheme was tested against the statistical, X2 , Histogram and non-structural steganalysis detection attacks. The obtained PSNR values revealed the accomplishment of higher imperceptibility and security by the proposed DGV scheme while a higher capacity compared to previous works. In short, the proposed steganography scheme outperformed the commercially available data hiding schemes, thereby resolved the existing issues

    The Effect of Mobile phone’s User Interface Configurations on User Comfort

    Get PDF
    Mobile phone consists of some input elements as its user interfaces for example keypad and navigator. Shape, layout, and dimension of the input elements determine the user interface configuration of mobile phone. The configuration of user interface may influence user comfort in using mobile phone. For that reason, it is important to understand the effect of various mobile phone’s user interface configurations to user comfort. This research investigates the effect of mobile phone’s user interface configurations on user comfort. First, this research collects some data related to shape, layout, and dimension of keypad and navigator of available mobile phones. Then, the data are synthesized to develop various alternatives of user interface configurations. Finally, a survey is conducted to investigate the effect of the developed configurations on user comfort. A questionnaire is spread among the user of QWERTY mobile phone as a survey. The result of the survey shows that some configurations are not preferred by the users because it is not comfortable according to them. However, the configurations that accommodate tight distance and square keypad with trackpad navigator provide the highest level of user comfort

    Preface

    Get PDF
    corecore