Impact Factor:6.549
 Scopus Suggested Journal: UNDER REVIEW for TITLE INCLUSSION

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary


Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

Design of an adaptive JPEG Steganalysis with UED

K.Samunnisa, M.Sri Lakshmi, Dr S.Prem Kumar, ,
Affiliations
(M.Tech), CSE, Assistant professor Department of Computer Science and Engineering
Assistant Professor, Department of Computer Science and Engineering
Professor & HOD, Department of computer science and engineering, G.Pullaiah College of Engineering and Technology, Kurnool, Andhra Pradesh, India.
:NOT ASSIGNED


Abstract
Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient suspects the existence of the message a form of security through obscurity. The internet as a whole does not use secure links, thus information in transit may be vulnerable to interception as well. The important of reducing a chance of the information being detected during the transmission is being an issue now days. In this paper, we proposed a class of new distortion functions known as uniform embedding distortion function (UED) is presented. By incorporating the syndrome trellis coding, the best code word with undetectable data hiding is achieved. Due to hiding more amounts of data into the intersected area, embedding capacity is increased. Our aim is to hide the secret information behind the image file. Steganography hides the secret message so that intruder’s can’t detect the communication. When hiding data into the intersected area, thus provides a higher level of security with more efficient data mean square error is reduced and embedding capacity is increased.


Citation
K.Samunnisa,M.Sri Lakshmi,Dr S.Prem Kumar."Design of an adaptive JPEG Steganalysis with UED". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 08,pp.497-504, August - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I808.pdf,


Keywords : JPEG Steganography, Minimal-Distortion Embedding, Uniform Embedding, Distortion Function Design.

References
[1] C. C. Chang, T. S. Chen and L. Z. Chung, “A steganographic method based upon JPEG and quantization table modification”, Information Sciences, vol. 141, 2002, pp. 123-138. 
[2] Parvinder Singh, Sudhir Batra, H R Sharma, "Message Hidden in 6th and 7th Bit", Proceedings of International Conference on Controls, Automation and Communication System, Dec. 22-24, 2004, Allied Publishers, pp-281- 284. 
[3] Parvinder Singh, Sudhir Batra, HR Sharma, "Evaluating the Performance of Message Hidden in 1st and 2nd Bit Plane", WSEAS Transactions on Information Science and Applications, issue 8, vol 2, August 2005, pp 1220- 1227. 
[4] Parvinder Singh, Sudhir Batra, HR Sharma, "Message Hidden in 1st and 2nd Bit Plane", Proceedings of 9th WSEAS International Conference on Computers, Athens, Greece, July 14-16, 2005, pp 1- 5. 
[5] Parvinder Singh, Sudhir Batra, H R Sharma, "Steganographic Methods Based on Digital Logic", 6th International Conference on Signal Processing, Dallas, USA, March 22-24,2007. 
[6] Prince Kumar Panjabi, Parvinder Singh, “An Enhanced Data Hiding Approach using Pixel Mapping Method with Optimal Substitution Approach”, International Journal of Computer Applications, vol.74(10), July 2013, pp. 36- 43. 
[7] Parvinder Singh, Sudhir Batra, HR Sharma, "Hiding Credentials in Biological Images", A & B Research, vol 22(1), Jan 2006, ISSN 0970-1970, pp 22- 25. 
[8] Sonam Chhikara, Parvinder Singh, “SBHCS: Spike based Histogram Comparison Steganalysis Technique”, International Journal of Computer Applications, vol.75, 2013. 
[9] Sudhir Batra, Parvinder Singh, “A Class of $ q $- ary 2-IPP Codes”, Journal of Informatics and Mathematical Sciences 5 (2), 65-76. 
[10] Parvinder Singh, Sudhir Batra, HR Sharma, “A review of digital signatures and status in India”, WSEAS Transactions on Computers 4 (4), 408-410. 
[11] Jasvinder Kaur, Manoj Duhan, Ashok Kumar, "Digital Logic Embedding Using Single Row." International Journal on Computer Science & Engineering, vol. 3, no. 12 , 2011. 
[12] Penne baker, William B., and Joan L. Mitchell, "JPEG: Still Image Data Compression Standard", Van Nostrand Reinhold, 1993. 
[13] H. W. Tseng and C.C. Chang, “Steganography using JPEG- compressed images”, Fourth International Conference on Computer and Information Technology, CIT '04, 14-16 Sept 2004, pp .12-17. 
[14] Kobayashi, H., Y. Noguchi and H. Kiya (1999), “A method of embedding binary data into JPEG Bitstreams” IEICE Trans. Information and Systems, J83-D-II, 1469–1476.


DOI Link : NOT ASSIGNED

Download :
  V2I808.pdf


Refbacks : Currently there are no Refbacks

Announcements


Authors are not required to pay any article-processing charges (APC) for their article to be published open access in Journal IJCERT. No charge is involved in any stage of the publication process, from administrating peer review to copy editing and hosting the final article on dedicated servers. This is free for all authors. 

News & Events


Latest issue :Volume 10 Issue 1 Articles In press

A plagiarism check will be implemented for all the articles using world-renowned software. Turnitin.


Digital Object Identifier will be assigned for all the articles being published in the Journal from September 2016 issue, i.e. Volume 3, Issue 9, 2016.


IJCERT is a member of the prestigious.Each of the IJCERT articles has its unique DOI reference.
DOI Prefix : 10.22362/ijcert


IJCERT is member of The Publishers International Linking Association, Inc. (“PILA”)


Emerging Sources Citation Index (in process)


IJCERT title is under evaluation by Scopus.


Key Dates


☞   INVITING SUBMISSIONS FOR THE NEXT ISSUE :
☞   LAST DATE OF SUBMISSION : 31st March 2023
☞  SUBMISSION TO FIRST DECISION :
In 7 Days
☞  FINAL DECISION :
IN 3 WEEKS FROM THE DAY OF SUBMISSION

Important Announcements


All the authors, conference coordinators, conveners, and guest editors kindly check their articles' originality before submitting them to IJCERT. If any material is found to be duplicate submission or sent to other journals when the content is in the process with IJCERT, fabricated data, cut and paste (plagiarized), at any stage of processing of material, IJCERT is bound to take the following actions.
1. Rejection of the article.
2. The author will be blocked for future communication with IJCERT if duplicate articles are submitted.
3. A letter regarding this will be posted to the Principal/Director of the Institution where the study was conducted.
4. A List of blacklisted authors will be shared among the Chief Editors of other prestigious Journals
We have been screening articles for plagiarism with a world-renowned tool: Turnitin However, it is only rejected if found plagiarized. This more stern action is being taken because of the illegal behavior of a handful of authors who have been involved in ethical misconduct. The Screening and making a decision on such articles costs colossal time and resources for the journal. It directly delays the process of genuine materials.

Citation Index


Citations Indices All
Citations 1026
h-index 14
i10-index 20
Source: Google Scholar

Acceptance Rate (By Year)


Acceptance Rate (By Year)
Year Rate
2021 10.8%
2020 13.6%
2019 15.9%
2018 14.5%
2017 16.6%
2016 15.8%
2015 18.2%
2014 20.6%

Important Links



Conference Proposal




DOI:10.22362/ijcert