7 research outputs found

    Analysis review on spatial and transform domain technique in digital steganography

    Get PDF
    This paper presents several techniques used in digital steganography in term of spatial and transform domain. Additionally, it analyses the performance and the metric evaluation of the techniques used in digital steganography based on spatial and transform domain. This paper aims to identify the main mediums of digital steganography, which are image-based, video-based and audio-based, in order to recognize the various techniques used with them. As a result, the primary technique used in the digital medium was LSB technique in the spatial domain, while in the transform domain, the main technique used was differentiated between DTC and DWT. Meanwhile, the common domain utilized in digital steganography was the spatial domain due to its simplicity and high embedding capacity. The future efforts for this paper will be considering the feature based in text steganography

    A Brief Analysis of Gravitational Search Algorithm (GSA) Publication from 2009 to May 2013

    Get PDF
    Gravitational Search Algorithm was introduced in year 2009. Since its introduction, the academic community shows a great interest on this algorith. This can be seen by the high number of publications with a short span of time. This paper analyses the publication trend of Gravitational Search Algorithm since its introduction until May 2013. The objective of this paper is to give exposure to reader the publication trend in the area of Gravitational Search Algorithm

    İmge içerisine LSB eşleştirme alanı tabanlı kayıplı imge gizleyen yüksek kapasiteli tersinir sırörtme yöntemi

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Sırörtme, iletişim dışındaki kişilerin ilk bakıştaki tespitlerini önlemek üzere gizli verinin masum görünen bir taşıyıcı ortam içine gizlenerek iletilmesi yöntemidir. Sırörtmede gizli verinin varlığından iletişim dışındakiler habersizdir. Sırörtme, imge, video, ses veya metin dosyalarına uygulanabilir. Bu tez çalışmasında, renkli imgeler içine renkli imge gizleyen yeni veri gizleme yöntemleri önerilmiştir. Önerilen yöntemlerin ilk üçü tersinir olmayan veri gizleme yöntemleridir. Tersinir olmayan yöntemler örtü imgeyi eşit çerçevelere bölerek mevcut bitlerle eşleştirme alanları oluşturmaktadır. Gizlenecek veri, eşleştirme alanları ile karşılaştırılarak gizlemeye uygun olup olmadıkları tespit edilir. Eşleşme oluştuğunda, gizli verinin yeri işaretlenir. Gizlenen veri, mevcut bitlerle temsil edildiği için sadece işaretleme işleminde bit değişikliği oluşur. Diğer üç yöntem ise tersinir yöntemlerdir. Tersinir yöntemler, 24-bit renkli imge içerisine yüksek kapasitede kayıplı 24-bit renkli imge gizlemektedir. Tersinir yöntemlerde, eşleştirme yöntemine göre değişiklik gösteren eşleştirme alanı aralıkları oluşturulur. Gizlenecek imge eşit parçalara bölünür ve her parçanın girdiği eşleştirme aralığına göre kodlanarak gizleme işlemi yapılır. Önerilen yöntemler, örtü imgede en az değişiklik yaparak en fazla veriyi gizlemeye çalışır. Önerilen yöntemlerin sıraçma algoritmalarına karşı başarımını test etmek için rasgele seçilen 150 imgeye veriler gizlenmiş ve imge bozulma ölçüm yöntemleri ile değerlendirilmiştir. Tez çalışmasında önerilen tersinir yöntemler, literatürdeki yöntemlere göre kapasite olarak iki kat daha verimli, değişiklik analizi olarak %10 daha düşük PSNR değeri elde etmiştir.Steganography is a data hiding method in an innocent media to prevent initial observations from third parties. Thus, third parties are not aware of the presence of the secret data when steganography is concerned. Steganography can be applied to image, video, audio or text files. In this thesis, a set of new data hiding methods have been proposed for still images. The first three are irreversible methods which divide cover media into equal mapping areas to match the bits of secret data. The mapping areas are tested whether they are suitable for hiding the bits of the secret data. If so, the location of the hidden bits are marked. Since the secret data are represented by existing bits in the cover file, cover bits can be changed only during marking procedures. The next proposed three methods are reversible by which high capacity lossy images can be hidden into images. In reversible methods, the mapping areas are created in determined coded ranges. Proposed methods try to embed as much as possible secret data with a minimum change in cover bits. The method proposed have been tested comprehensively against well-known steganalysis algorithms using 150 image files embedded with secret data then the image distortion parameters have been evaluated. The proposed reversible methods have achieved two times better capacity and %10 lower distortion rate as PSNR compared to the studies in the literature

    Applied Metaheuristic Computing

    Get PDF
    For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC

    Applied Methuerstic computing

    Get PDF
    For decades, Applied Metaheuristic Computing (AMC) has been a prevailing optimization technique for tackling perplexing engineering and business problems, such as scheduling, routing, ordering, bin packing, assignment, facility layout planning, among others. This is partly because the classic exact methods are constrained with prior assumptions, and partly due to the heuristics being problem-dependent and lacking generalization. AMC, on the contrary, guides the course of low-level heuristics to search beyond the local optimality, which impairs the capability of traditional computation methods. This topic series has collected quality papers proposing cutting-edge methodology and innovative applications which drive the advances of AMC

    Engineering Education and Research Using MATLAB

    Get PDF
    MATLAB is a software package used primarily in the field of engineering for signal processing, numerical data analysis, modeling, programming, simulation, and computer graphic visualization. In the last few years, it has become widely accepted as an efficient tool, and, therefore, its use has significantly increased in scientific communities and academic institutions. This book consists of 20 chapters presenting research works using MATLAB tools. Chapters include techniques for programming and developing Graphical User Interfaces (GUIs), dynamic systems, electric machines, signal and image processing, power electronics, mixed signal circuits, genetic programming, digital watermarking, control systems, time-series regression modeling, and artificial neural networks
    corecore