IJEA - Volume 7 Issue 6 (June 2018)

 


Sr/No/ Title Pdf
1
REVIEW ON DATA HIDING METHOD IN LOSSY JPEG IMAGE COMPRESSION
Ankit Arvind Mishra (JEC, Jabalpur)
ABSTRACT - In today’s world, networking and multimedia technologies are developing rapidly. People can communicate and exchange information with each other over the Internet at anytime and anywhere. The Internet is an open network so that all kinds of multimedia information like audio, video and images can be obtained freely and copied even edited then transmitted as one wishes. This makes the integrality, reliability and security of data transmitted under threat at the same time. Therefore, information security has always been a major concern. As one of the ways to solve the security problem, data hiding technology embeds the secret data imperceptibly into the cover media by slightly modifying some of the cover elements. Traditional data hiding techniques usually introduce irreversible distortion in the cover media which cannot be recovered after secret data extraction. However, the distortion may be not allowed in the medical, military and legal fields. To overcome this problem, reversible data hiding has been proposed as a new solution where both secret data and the original cover media can be extracted and recovered without any distortion. Moreover, data hiding techniques can be applied to other aspects such as embedding patient’s information into medical images and embedding geographic information into remote sensing satellite images.
Keywords— DWT: Discrete Wave Transform, SVD: Singular Value Decomposition, PSNR: Peak Signal to Noise Ratio, MSE: Mean Square Error .
Page No. 01 - 06 .

Download
2
Data Hiding Reversible Method in Encrypted JPEG Image: A Review
Priyanka Thakur and Silky Pareyani (GGCT - Jabalpur)
ABSTRACT - Information security has always been a major concern. As one of the ways to solve the security problem, data hiding technology embeds the secret data imperceptibly into the cover media by slightly modifying some of the cover elements. Traditional data hiding techniques usually introduce irreversible distortion in the cover media which cannot be recovered after secret data extraction. However, the distortion may be not allowed in the medical, military and legal fields. To overcome this problem, paper discusses reversible data hiding in JPEG compressed image as a new solution where both secret data and the original cover media can be extracted and recovered without any distortion. Moreover, data hiding techniques can be applied to other aspects such as embedding patient’s information into medical images and embedding geographic information into remote sensing satellite images. .
Keywords — Keywords: DWT: Discrete Wavelet Transform, SVD: Singular Value Decomposition, PSNR: Peak Signal to Noise Ratio, MSE: Mean Square Error
Page No. 01 -06 .
Download
3
Underwater Image Quality Enhancement using methods: A Review

Priyesh Sharma, Prof. Abhishek Verma (JEC Jabalpur)
ABSTRACT Underwater environments generally cause color cast or color scatter while photography. color scatter is due to haze effects appearing when light reflected from thing which absorbed or may be scattered several times by particles of water. This cause lowers the visibility and less contrast of the image. color cast is due to the varying attenuation of light in various wavelengths, and this is cause underwater environments bluish. To mention distortion from color scatter and color cast, this paper proposes a method to reconstruct underwater images that which is a combination of a wavelength compensation and de-hazing algorithm (IDWC). One has to determine the distance between the objects and the camera using dark channel prior, then haze effects cause by color scatter can be removed by the de-hazing algorithm. Next, one has to estimation the photography scene depth using residual energy ratios for each. According to the attenuation of every wavelength, reverse compensation conducted to restore all distortion from color cast.
Keywords - HSMF: HSI stretching and Median Filter, ACCLAHE: Adaptively clipped contrast limited histogram equalization , WCID: Wavelength compensation and image Dehazing
Page No. 01-04 .
Download
4
Implementation of Association Rule Mining for Fingerprint Identification by MATLAB

Ravi Kumar Mishra and Prof Abhishek Verma (JEC, Jabalpur)
ABSTRACT -The paper conducted on 100 subjects (50 males and 50 females) in the age group of 18–30 years. Ridge densities on the right- and left-hand thumbprints were determined using a newly designed layout and analyzed statistically, the proposed work results showed that females tend to have a higher thumbprint ridge density in both the areas examined, individually and combined. Applying the LR-test, the differences in the ridge densities of males and females at LoC (Left of Centre), RoC (Right of Centre) and Combined (LoC + RoC) were found to be statistically significant at p< 0.01 levels, proving the association between gender and fingerprint ridge density. Probability densities for men and women derived from the frequency distribution (at LoC, RoC and Combined) were used to calculate the likelihood ratio. Differences in the thumb ridge density can be used as an important tool for the determination of gender in cases where partial thumbprints are encountered as evidence. The work is done on MATLAB 2013b version & standard human fingerprint database is CASIA for genuine comparison.
Keywords: LoC: Left of Centre, RoC: Right of Centre, LR: Likelihood Ratio, PDF:Probability density function, ARM: Association Rule Mining
Page No. 01-09 .
Download
5
Highly Avalanche Chaotic Image Encryption Scheme Based On Modified SHA-1

Shubham Jain and Prof. Abhishek Verma ( JEC Jabalpur)
ABSTRACT - Our approach is to propose a fast and secure scheme for digital image encryption using only two-diffusion process based on nested chaotic attractor and the Secure Hash Algorithm SHA-1 to generate a secret key. The main advantages of our chaotic sequence used are the efficiency, simplicity and rapidity, all these features are very important it can be implemented on embedded systems. The paper work is a new approach in the hashing area, which use a modified SHA-1 image Encryption/ hashing with modifier round proposed design has come up with idea of using 40 rounds instead of 80 round of SHA-1, that will increase the speed of hash generation for achieving that proposed work simply modified the single compression/iteration operation. The results of security analysis such as statistical tests, differential attacks, key space, key sensitivity, entropy information and the running time are illustrated and compared to recent encryption schemes where the highest security level and speed are improved.
Keywords - AES-Advance encryption System, SHA-Secure Hash Algorithm, NPCR-Number of Pixels Change Rate, UACI-unified averaged changed intensity
Page No. 01-04 .
Download