Refine your search
Collections
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sharma, Vipul
- Textual Data Hiding in Digital Images Using Chaotic Maps
Abstract Views :213 |
PDF Views:1
Authors
Affiliations
1 Department of Computer Science & Engineering, National Institute of Technology, Srinagar, IN
1 Department of Computer Science & Engineering, National Institute of Technology, Srinagar, IN
Source
International Journal of Computer Networks and Applications, Vol 5, No 6 (2018), Pagination: 78-86Abstract
In this research paper another methodology for covering up literary information in computerized hued pictures has been proposed. Digital colored pictures will simply be used as a canopy media in steganography as a result of numerous deficiencies rumored in sensory system of mortals. In the proposed system we have utilized two non-subordinate disordered arrangement, for distinguishing the fundamental pixel positions where the bits relating to the mystery message must be inserted in the computerized cover picture. For implanting the message bits in the clamorously chosen pixels a 3-3-2 Least Significant Bit (LSB) addition strategy has been utilized. The proposed technique also provides a sufficient level of security because of the fact that same series of chaotically generated pixel locations for embedding the message bits is very difficult to be reproduced, till and unless the initial conditions of the 2 chaotic maps used for pixel selection method are well known. Additionally, the arranged method gives higher leads as far as PSNR (Peak Signal to noise ratio) and MSE (Mean squared error) values when contrasted, with optional existing strategies, subsequently guaranteeing that meddlers won't have any doubt that there is a message covered up inside the sent cover picture.Keywords
Steganography, LSB, PSNR, MSE, Chaotic Maps, Cover Image, Stego Image, Histogram.References
- William Stallings, (2003) Cryptography and Network Security, Principles & Practices, third edition, Pearson Education, Singapore.
- B. Dunba. (2002). A detailed look at steganographic techniques and their use in an open system environment, Sans institute.
- C. Christian. An Information Theoretic Model for Steganography, Proceedings of 2nd Workshop on information Hiding, MIT laboratory.
- Jhonson, January 2002. Survey of Steganography Software, technical report.
- Krenn, R. “Steganography and Steganalysis”,“http://www.krenn.nl/univ/cry/steg/article.pdf
- Dey, S., Abraham, A., Sanyal, S. (2007, August). An LSB data hiding technique using prime numbers. In Information Assurance and Security, 2007. IAS 2007. Third International Symposium on (pp. 101-108). IEEE.
- Yu, L., Zhao, Y., Ni, R., Li, T. (2010). Improved adaptive LSB steganography based on chaos and genetic algorithm. EURASIP Journal on Advances in Signal Processing, 2010, 32.
- Liao, X., Wen, Q. Y., Zhang, J. (2011). A steganographic method for digital images with four-pixel differencing and modified LSB substitution. Journal of Visual Communication and Image Representation, 22(1), 1-8.
- Kumar, A., Kumari, S., Patro, S., Sh, T., Acharya, A. K. Image Steganography using Index based Chaotic Mapping., IJCA Proceedings on International Conference on Distributed Computing and Internet Technology, ICDCIT 2015(1):1-4, January 2015.
- Zaghbani, S., Rhouma, R. (2013, April). Data hiding in spatial domain image using chaotic map. In Modeling, Simulation and Applied Optimization (ICMSAO), 2013 5th International Conference on (pp. 1-5). IEEE.
- Anees, A., Siddiqui, A. M., Ahmed, J., Hussain, I. (2014). A technique for digital steganography using chaotic maps. Nonlinear Dynamics, 75(4), 807-816.
- Ghebleh, M., Kanso, A. (2014). A robust chaotic algorithm for digital image steganography. Communications in Nonlinear Science and Numerical Simulation, 19(6), 1898-1907.
- Kanso, A. (2012). Steganographic algorithm based on a chaotic map. Communications in Nonlinear Science and Numerical Simulation, 17(8), 3287-3302.
- Juneja, M., Sandhu, P. S. (2013). An improved LSB based steganography technique for RGB color images. International Journal of Computer and Communication Engineering, 2(4), 513.
- Bandyopadhyay, D., Dasgupta, K., Mandal, J. K., Dutta, P. (2014). A novel secure image steganography method based on Chaos theory in spatial domain. International Journal of Security, Privacy and Trust Management (IJSPTM), 3(1), 11-22.
- Dasgupta, K., Mandal, J. K., Dutta, P. (2012). Hash based least significant bit technique for video steganography (HLSB). International Journal of Security, Privacy and Trust Management (IJSPTM), 1(2), 1-11.
- Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P. (2010). Digital image steganography: Survey and analysis of current methods. Signal processing, 90(3), 727-752.
- Goel, S., Rana, A., Kaur, M. (2013). A review of comparison techniques of image steganography. Global Journal of Computer Science and Technology, 13(4).
- The USC-SIPI Image Database, University of Southern California, Signal and Image Processing Institute. Available at: http://sipi.usc.edu/database/, last accessed in February 2016.
- Zhou Wang and Alan C. Bovik (2009). Mean Squared Error: Love It or Leave It? A new look at signal fidelity measures. IEEE signal processing Magazine.
- www.merriam-webster.com/dictionary/cryptography.
- Suchi Agarwal, Dr. Jaipal Singh Bhist (2016). Data hiding in digital image processing using cryptography and steganography. IRJET, vol. 03, issue: 05.
- Mervat Mikhail, Yasmine Abouelseoud, Galal Elkobrosy. “Text Hiding in a Digital Cover Image using Two Dimensional Indexing based on Chaotic Maps” International Journal of Computer Applications (0975 - 8887) Volume 138 - No.12, March 2016.
- Vipul Sharma, Madhusudan (2015). “Two new approaches for image steganography using cryptography”, 2015 Third international conference on image information processing (ICIIP), 2015.
- Vipul Sharma, Sunny Kumar (2013). “A new approach to hide text in images using steganography”. IJARCSSE (2013).
- Hassan Elkamchouchi, Wessam M. Salama, Yasmine Abouelseoud. “Data hiding in a digital cover image using chaotic maps & LSB technique”, 2017 12th International Conference on Computer Engineering and Systems (ICCES), 2017
- Goel, Stuti, Arun Rana, and Manpreet Kaur. “ADCT-based Robust Methodology for Image Steganography”, International Journal of Image Graphics and Signal Processing, 2013.
- Sharif, Ami, Majid Mollaeefar, and Mahboubeh Nazari. “A novel method for digital image steganography based on a new three-dimensional chaotic map”, Multimedia Tools & Applications, 2016.
- J.K. Mandal, A. Khamrui. “A Genetic Algorithm based steganography in frequency domain (GASFD)”, 2011 International Conference on Communication and Industrial Application, 2011.
- preview-springerplus.springeropen.com
- Abid Yahya. “Steanography Techniques for Digital Images”, Springer Nature, 2019.
- Nadeem Akhtar, Pragati Johri, Shahbaaz Khan. “Enhancing the Security and Quality of LSB Based Image Steganography”, 2013 5th International Conference on Computational Intelligence and Communication Networks, 2013.
- Reddy, Velagalapalli Lokeswara, Arige Subramanyam, and Pakanati CHenna Reddy. “A novel technique for JPEG image steganography and its performance evaluation”, International Journal of Advanced Media and Communication, 2014.
- Jiang, Nan, Na Zhao, and Luo Wang. “LSB Based Quantum Image Steganography Algorithm”, International Journal of Theoretical Physics, 2015.
- H. Nabaee, K.Faez. “An efficient steganography method based on reducing changes”, 2010 25th International Conference of Image and Vision Computing New Zealand, 2010.
- Shabir A. Parah, Javaid A. Sheikh, Abdul M. Hafiz, G.M. Bhat. “Data hiding in scrambled images: A new double layer security data hiding technique”, Computers & Electrical Engineering, 2014.
- Dadgostar, H., and F. Afsari. “Image steganography based on interval-valued intuitionistic fuzzy edge detection and modified LSB”, Journal of Information Security and Applications, 2016.
- Prabira Kumar Sethy, Kamal Pradhan, Santi Kumar Behera. “A security enhanced approach for video Steganography using K-Means clustering and direct mapping”, 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT), 2016.
- Tamer Rabie, Mohammed Baziyad, Ibrahim Kamel. “Enhanced high capacity image steganography using discrete wavelet transform and the laplacian pyramid”, Multimedia Tools & Applications, 2018.
- Maheshwari, S.Uma, and D.Jude Hemanth. “Different methodology for image steganography-based data hiding: review paper”, International Journal of Information and Communication technology, 2015.
- Sajasi, Sara, and Amir-Masoud Eftekhari Moghadam. “An adaptive image steganographic scheme based on Noise Visibility Function and an optimal chaotic based encryption method’, Applied Soft Computing, 2015.
- Vinsa Varghese. “A secure method for hiding data on cubism image using hybrid feature detection method”, International Journal of Research in Engineering and Technology, 2014.
- Omar Banimelhem, Lo’ai Tawalbeh, Moad Mowafi, Mohammed Al-Batati. “A more secure image hiding scheme using pixel adjustment and genetic algorithm”, International Journal of Information Security and Privacy, 2013.
- M.Ghebleh, A. Kanso. “A robust chaotic algorithm for digital image steganography”, Communications in Nonlinear Science and Numerical Simulation, 2014 [45] “Intelligent Systems Design and Applications”, Springer Nature, 2018
- Dogan, Sengul. “A new data hiding method based on chaos embedded genetic algorithm for color image”, Artificial Intelligence Review, 2016.
- Advances in Intelligent Systems and Computing, 2016.
- Sarosh K. Dastoor. “Comparative Analysis of Steganographic algorithms intacting the information in the speech signal for enhancing the message security in next generation mobile devices”, 2011 World Congress on Information and Communication Technologies, 2011.
- Fabrication and Mechanical Characterization of Walnut/Polyester Composites
Abstract Views :200 |
PDF Views:86
Authors
Affiliations
1 School of Mech Engg., Shri Mata Vaishno Devi University, Katra, Jammu and Kashmir, IN
2 School of MechEngg., Shri Mata Vaishno Devi University, Katra, Jammu and Kashmir, IN
1 School of Mech Engg., Shri Mata Vaishno Devi University, Katra, Jammu and Kashmir, IN
2 School of MechEngg., Shri Mata Vaishno Devi University, Katra, Jammu and Kashmir, IN
Source
International Journal of Vehicle Structures and Systems, Vol 10, No 5 (2018), Pagination: 381-383Abstract
Use of natural fibres as reinforcement in polymeric composites has been increased during last few decades. They are potential alternatives to synthetic fibres due to their excellent properties like light in weight, biodegradable, abundant, satisfactory strength etc. Various parts of automobiles are being made by natural fibres that improved fuel efficiency and reduced emissions. The present study focuses on developing new polymer composites by reinforcing walnut shell particulate on the basis of different weight fractions. Mechanical characterization was done for the developed composites which include evaluation of tensile strength, impact strength and hardness. Different weight fractions of walnut shell particulate were used including 0%, 10%, 15% and 20%. Maximum tensile strength was achieved in case of 10% walnut shell reinforced composites. Maximum impact strength and hardness were achieved in case of 20% and 15% reinforcement respectively.Keywords
Fibre Reinforced Polymers, Natural Fibre, Mechanical Characterization, Fabrication.References
- A.G. Facca, M.T. Kortschot and N. Yan. 2005. Predicting the elastic modulus of natural fibre reinforced thermoplastics composites, Applied Sci. and Manufacturing, 37, 1660-1671. https://doi.org/10.1016/j.compositesa.2005.10.006
- A. Anand, M.I.U. Haq, A. Raina, K. Vohra, R. Kumar and S.M. Sharma. 2017. Natural systems and tribology analogies and lessons, Materials Today 6th ICMPC, 5228-5232.
- S. Sangha and V.K. Thakur. 2007. Mechanical properties of natural fibre reinforced polymer composites, Bull. Mater. Sci., 30, 791-799.
- P.K. Bajpai, I. Singh and J. Madaan. 2014. Development and characterization of PLA-based green composites: A review, J. Thermoplastic Composite Materials, 27(1), 52-81. https://doi.org/10.1177/0892705712439571.
- M.A. Fuqua and C.A. Ulven. 2008. Preparation and characteristics of polypropylene composites reinforced with modified lignocellulose corn fibre, American Society of Agricultural and Biological Engineers.
- N. Graupner. 2008. Application of lignin as natura l adhesion promoter in cotton fibre-reinforced poly (lactic acid) (PLA) composites, J. Master. Sci., 43, 5222-5229. https://doi.org/10.1007/s10853-008-2762-3.
- H.V.S.G. Rao, Narendrataly and P.V. Vijay. 2005. Reinforced Concrete Design with FRP Composites, CRC Press, Taylor & Francis Group.
- R. Hu and J.K. Lim. 2007. Fabrication and mechanical properties of completely biodegradable hemp fibre reinforced poly-lactic acid composites, J. Composite Materials 41, 1655-1669. https://doi.org/10.1177/0021998306069878.
- J. Holbery and D. Houston. 2006. Natural-fiberreinforced polymer composites in automotive applications, J. Materials, 58(11), 80-86. https://doi.org/10.1007/s11837-006-0234-2.
- H. Ku, H. Wang, N. Pattarachaiyakoop and M. Trada. 2007. A review on the tensile properties of natural fibr e reinforced polymer composites, Centre of Excellence in Engineered Fibre Composites.
- J.W. Frost. 2002. Redefining chemical manufacture, Industrial Bio-Tech., 1(1), 23-25. https://doi.org/10.1089/ind.2005.1.23.
- K. Joseph, R.D.T. Filho, B. James, S. Thomas and L.H.D Carvalho. 1999. A review on Sisal fibre reinforced Polymer, Brazilian J Agriculture Environmental Engg., 3(3), 367-379.
- R.M. Rowell, J.S. Hans and J.S. Rowell. 2000. Characteristics and factor affecting fibre properties, Natural Polymers and Agro-fibre Composites, 115-133.
- B. Singh, M. Gupta and A. Verma. 1996. Influence of fibre surface treatment on the properties of Sisalpolyester composites, Polymer Composites, 17(6), 910-918. https://doi.org/10.1002/pc.10684.
- S. Myers. 2008. Renewable polymers and advanced materials, Reshaping American Agriculture to Meet its Biofuel and Biopolymer Roles, 75-81.
- S. Wang, L. Panigrahi, W. Tabil and S. Sokansanj. 2006. Modification of flax fibres by chemical treatment, The Canadian Society for Engg. in Agriculture, Food and Biological systems, 03-337, 1-15.
- X. Li, L.G. Tabil, S. Panigrahi and W.J. Crerar. 2005. The influence of fibre content on properties of injection moulded flax fibre-HDPE biocomposites, The Canadian Society for Bio-Engg., 06-161, 1-10.
- Breaking Down Decentralized Exchange
Abstract Views :115 |
PDF Views:0
Authors
Affiliations
1 Research Scholar, SET, Sharda University, Gr. Noida, IN
2 Professor, SET, Sharda University, Gr. Noida, IN
1 Research Scholar, SET, Sharda University, Gr. Noida, IN
2 Professor, SET, Sharda University, Gr. Noida, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 35, No SP (2023), Pagination: 339-351Abstract
This paper gives an in-depth analysis of the key elements and technologies that make up the Decentralized exchange (DEX) ecosystem. We examine the main characteristics that set DEXs apart from centralized exchanges, highlighting the advantages and difficulties of this cutting-edge paradigm. We also consider the merits and disadvantages of the various DEX model types, including automated market makers (AMMs) and order book-based exchanges. The study also analyses potential ways to reduce these vulnerabilities and covers the primary security and legal issues surrounding DEXs. We conclude by looking at the most recent developments in the DEX market, such as the growth of cross-chain interoperability and decentralized finance (Decentralized Finance) protocols.Keywords
Decentralized Exchange, Centralized Exchanges, Decentralized Finance, Blockchain.References
- Chiu, J., & Koeppl, T. (2021). Decentralized Exchanges. Annual Review of Financial Economics, 13, 129-149..
- Petersen, H., & Larsen, K. (2022). Decentralized Exchanges: A Systematic Literature Review. IEEE Access, 10, 3430-3455.
- Pettit, N., & Gipp, B. (2021). Decentralized Exchanges: Current Status and Future Directions. In Proceedings of the 20th International Conference on Web Engineering (ICWE '21) (pp. 193-204). ACM.
- Kang, M., Lee, J., Kim, K., & Kim, D. (2021). A Survey of Atomic Swaps: State-of-the-Art and Future Directions. IEEE Access, 9, 55092-55108.
- Zohren, S., & Mahajan, A. (2021). Liquidity on Decentralized Exchanges. In Proceedings of the 18th International Conference on Principles of Distributed Systems (OPODIS '21) (pp. 47:1-47:8). Schloss Dagstuhl--Leibniz-Zentrum für Informatik.
- Hoffman, D., & Mugavero, G. (2021). A Review of Decentralized Exchange Technology and User Experience. In Proceedings of the 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS) (pp. 112-119).
- Moeser, M., Böhme, R., & Breuker, D. (2018). An Empirical Analysis of Off-Chain Transaction Handling in Payment Channel Networks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18) (pp. 935-950). ACM.
- Jain, S., & Singh, A. (2022). Liquidity Provision Mechanisms in Decentralized Exchanges: A Review. In Proceedings of the 2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) (pp. 134-139).
- Böhme, R., Christin, N., Edelman, B., & Moore, T. (2015). Bitcoin: Economics, Technology, and Governance. Journal of Economic Perspectives, 29(2), 213-238.
- Kshetri, N. (2021). Blockchain's roles in meeting key supply chain management objectives. International Journal of Information Management, 56, 102227.
- Y. Chen, Y. Zhang, and W. Shi. (2021). "Decentralized exchange based on hybrid order book and automated market maker," in IEEE Access, vol. 9, pp. 13032-13040, doi: 10.1109/ACCESS.2021.3052272.
- Z. Yang, C. Wu, and X. Chen. (2021). "A new trading mechanism for DeFi based on automated market maker," in IEEE Access, vol. 9, pp. 10748-10760, doi: 10.1109/ACCESS.2021.3050403.
- A. Mondal and P. Kumar. (2021). "Impermanent loss and risk management for decentralized finance," in IEEE Access, vol. 9, pp. 18780-18790, doi: 10.1109/ACCESS.2021.3053475.
- N. Sharma, S. Sharma, and R. Kumar. (2021). "A review of layer-2 scaling solutions for Ethereum blockchain," in IEEE Access, vol. 9, pp. 13615-13629, doi: 10.1109/ACCESS.2021.3055201.