4 research outputs found

    Describing Colors, Textures and Shapes for Content Based Image Retrieval - A Survey

    Full text link
    Visual media has always been the most enjoyed way of communication. From the advent of television to the modern day hand held computers, we have witnessed the exponential growth of images around us. Undoubtedly it's a fact that they carry a lot of information in them which needs be utilized in an effective manner. Hence intense need has been felt to efficiently index and store large image collections for effective and on- demand retrieval. For this purpose low-level features extracted from the image contents like color, texture and shape has been used. Content based image retrieval systems employing these features has proven very successful. Image retrieval has promising applications in numerous fields and hence has motivated researchers all over the world. New and improved ways to represent visual content are being developed each day. Tremendous amount of research has been carried out in the last decade. In this paper we will present a detailed overview of some of the powerful color, texture and shape descriptors for content based image retrieval. A comparative analysis will also be carried out for providing an insight into outstanding challenges in this field

    Secure Image Steganography using Cryptography and Image Transposition

    Full text link
    Information security is one of the most challenging problems in today's technological world. In order to secure the transmission of secret data over the public network (Internet), various schemes have been presented over the last decade. Steganography combined with cryptography, can be one of the best choices for solving this problem. This paper proposes a new steganographic method based on gray-level modification for true colour images using image transposition, secret key and cryptography. Both the secret key and secret information are initially encrypted using multiple encryption algorithms (bitxor operation, bits shuffling, and stego key-based encryption); these are, subsequently, hidden in the host image pixels. In addition, the input image is transposed before data hiding. Image transposition, bits shuffling, bitxoring, stego key-based encryption, and gray-level modification introduce five different security levels to the proposed scheme, making the data recovery extremely difficult for attackers. The proposed technique is evaluated by objective analysis using various image quality assessment metrics, producing promising results in terms of imperceptibility and security. Moreover, the high quality stego images and its minimal histogram changeability, also validate the effectiveness of the proposed approach.Comment: A simple but effective image steganographic method, providing secure transmission of secret data over Internet. The final published version of the paper can be downloaded from the link: (http://www.neduet.edu.pk/NED-Journal/2015/15vol4paper3.html). Please contact me at [email protected] if you need the final formatted published version of the pape

    Steganography: A Secure way for Transmission in Wireless Sensor Networks

    Full text link
    Addressing the security concerns in wireless sensor networks (WSN) is a challenging task, which has attracted the attention of many researchers from the last few decades. Researchers have presented various schemes in WSN, addressing the problems of processing, bandwidth, load balancing, and efficient routing. However, little work has been done on security aspects of WSN. In a typical WSN network, the tiny nodes installed on different locations sense the surrounding environment, send the collected data to their neighbors, which in turn is forwarded to a sink node. The sink node aggregate the data received from different sensors and send it to the base station for further processing and necessary actions. In highly critical sensor networks such as military and law enforcement agencies networks, the transmission of such aggregated data via the public network Internet is very sensitive and vulnerable to various attacks and risks. Therefore, this paper provides a solution for addressing these security issues based on steganography, where the aggregated data can be embedded as a secret message inside an innocent-looking cover image. The stego image containing the embedded data can be then sent to fusion center using Internet. At the fusion center, the hidden data is extracted from the image, the required processing is performed and decision is taken accordingly. Experimentally, the proposed method is evaluated by objective analysis using peak signal-to-noise ratio (PSNR), mean square error (MSE), normalized cross correlation (NCC), and structural similarity index metric (SSIM), providing promising results in terms of security and image quality, thus validating its superiority

    A novel magic LSB substitution method (M-LSB-SM) using multi-level encryption and achromatic component of an image

    Full text link
    Image Steganography is a thriving research area of information security where secret data is embedded in images to hide its existence while getting the minimum possible statistical detectability. This paper proposes a novel magic least significant bit substitution method (M-LSB-SM) for RGB images. The proposed method is based on the achromatic component (I-plane) of the hue-saturation-intensity (HSI) color model and multi-level encryption (MLE) in the spatial domain. The input image is transposed and converted into an HSI color space. The I-plane is divided into four sub-images of equal size, rotating each sub-image with a different angle using a secret key. The secret information is divided into four blocks, which are then encrypted using an MLE algorithm (MLEA). Each sub-block of the message is embedded into one of the rotated sub-images based on a specific pattern using magic LSB substitution. Experimental results validate that the proposed method not only enhances the visual quality of stego images but also provides good imperceptibility and multiple security levels as compared to several existing prominent methods.Comment: This paper has been published in Multimedia Tools and Applications Journal with impact factor=1.058. The readers can study the formatted paper using the following link: http://link.springer.com/article/10.1007/s11042-015-2671-9. Please use sci-hub.org for downloading this paper if you are unable to access it freely or email us at [email protected]
    corecore