scholarly journals Merge and Split approach incolor image Steganography using Run Length Encoding and LSB Techniques

Author(s):  
Rajput G ◽  
◽  
Ramesh Chavan ◽  

The purpose of steganography is to communicate secret messages between the sender and intended recipient in such a way that no one suspects the very existence of the message. The techniques aim to protect the secret information from third parties by embedding them into other information such as text, audio signals, images, and video frames. In this paper we propose a novel approach of hiding secret messages in multiple images (a cover image)using run length encoding and LSB techniques and communicate the message to intended person over the communication channel by transmitting individual images.Experiments are performed on a set of color images and performance of the proposed system is presented.

2014 ◽  
Vol 14 (2) ◽  
pp. 5479-5486
Author(s):  
Ali Hussein Hadi

This paper presents a novel covert channel for secret communications. It implements a new application layer covert channel, by applying multimedia steganography techniques to hide secret messages. This new channel method (called Under Your Radar (UYR)) provides a stealthiness method for the communication channel and an efficient method for hiding messages, as proved by our investigations. Such a covert channel will be used for transferring secret messages in two phases. In phase one, the message characters will be embedded randomly into the pixels of video frames. The choice of pixels is dependent on finding an identical value of the character ASCII representation from one of the pixel channels. The positions of pixels will form the steganography key, which will be used later to extract the message. Also, the steganography key will be embedded in an image using the LSB steganography technique. In phase two, the secret message will be exchanged between the sender and the receiver by sharing the video along with the steganography key over a public service (e.g.  a social network), which serves as the new covert communication channel. The experiments outcomes have showed an improvement on the success of the proposed covert channel in exchanging secret messages without rising suspicion by observers or detection tools.


2011 ◽  
Vol 403-408 ◽  
pp. 963-969 ◽  
Author(s):  
Mayank Srivastava ◽  
Mohd Qasim Rafiq

The digital information revolution has brought important changes in our society and life. Nowadays, large amount of data is transmitted over the network and if the data that is being transmitted is important, one should use secure technique like steganography to transmit it. Steganography is a method of hiding a secret message in a cover media such as text, image, audio etc. in a way that hides the existence of the secret data. This paper introduces new method for audio steganography. The proposed method works on the basis of low bit blind encoding scheme which is used to embed secret data into non-silent samples of wav audio file. Robustness and performance of the proposed scheme is investigated by performing experiments on different audio signals.


Author(s):  
Mark O Sullivan ◽  
Carl T Woods ◽  
James Vaughan ◽  
Keith Davids

As it is appreciated that learning is a non-linear process – implying that coaching methodologies in sport should be accommodative – it is reasonable to suggest that player development pathways should also account for this non-linearity. A constraints-led approach (CLA), predicated on the theory of ecological dynamics, has been suggested as a viable framework for capturing the non-linearity of learning, development and performance in sport. The CLA articulates how skills emerge through the interaction of different constraints (task-environment-performer). However, despite its well-established theoretical roots, there are challenges to implementing it in practice. Accordingly, to help practitioners navigate such challenges, this paper proposes a user-friendly framework that demonstrates the benefits of a CLA. Specifically, to conceptualize the non-linear and individualized nature of learning, and how it can inform player development, we apply Adolph’s notion of learning IN development to explain the fundamental ideas of a CLA. We then exemplify a learning IN development framework, based on a CLA, brought to life in a high-level youth football organization. We contend that this framework can provide a novel approach for presenting the key ideas of a CLA and its powerful pedagogic concepts to practitioners at all levels, informing coach education programs, player development frameworks and learning environment designs in sport.


2021 ◽  
pp. 1-45
Author(s):  
Benjamin Leard ◽  
Joshua Linn ◽  
Yichen Christy Zhou

Abstract During historical periods in which US fuel economy standards were unchanging, automakers increased performance but not fuel economy, contrasting with recent periods of tightening standards and rising fuel economy. This paper evaluates the welfare consequences of automakers forgoing performance increases to raise fuel economy as standards have tightened since 2012. Using a unique data set and a novel approach to account for fuel economy and performance endogeneity, we find undervaluation of fuel cost savings and high valuation of performance. Welfare costs of forgone performance approximately equal expected fuel savings benefits, suggesting approximately zero net private consumer benefit from tightened standards.


2019 ◽  
Vol 9 (16) ◽  
pp. 3274
Author(s):  
Han ◽  
Kan

The edges of images are less sparse when images become blurred. Selecting effective image edges is a vital step in image deblurring, which can help us to build image deblurring models more accurately. While global edges selection methods tend to fail in capturing dense image structures, the edges are easy to be affected by noise and blur. In this paper, we propose an image deblurring method based on local edges selection. The local edges are selected by the difference between the bright channel and the dark channel. Then a novel image deblurring model including local edges regularization term is established. The obtaining of a clear image and blurring kernel is based on alternating iterations, in which the clear image is obtained by the alternating direction method of multipliers (ADMM). In the experiments, tests are carried out on gray value images, synthetic color images and natural color images. Compared with other state-of-the-art blind image deblurring methods, the visualization results and performance verify the effectiveness of our method.


Author(s):  
Iurii Eduardovich Serov

The subject of this research is the monumental vocal-symphonic piece of the prominent Russian composer of the second half of the XX century Boris Tishchenko. His Symphony No.6 s based on the poems by A. Naiman, A. Akhmatova, O. Mandelstam, M. Tsvetaeva and V. Levinzon, completed in 1989, and tribute to Yevgeny Alexandrovich Mravinsky, who passed away a year before. Poetic lines that form the backbone of the symphony contain multiple images resembling death, which imparts a profound meaning, a moment of personal experience in dedication to the prominent conductor. Special attention is given to the symphonic dramaturgy of the Symphony No.6, the problem of interrelation between music and poetry, realization of the complex literary texts in the ultimately modern symphonism of Boris Tishchenko. The conclusion is made that Tishchenko is absolutely seamless in this vocal-symphonic opus and reveres his coauthors. The translates everything into the music, without missing a tiny thing that can reveal its meaning and beauty. At the same time, the circle of poetic images, semantics of the verse were transformed in accordance with his worldview. The novelty is defined by the fact that this article is first in Russian musicology, to comprehensively analyze the Symphony No.6  by Boris Tishchenko, reveal its semantics, and performance difficulties. The author attributes this symphonic composition of Boris Tishchenko to most remarkable in the history of Russian music.


2016 ◽  
Vol 145 (5) ◽  
pp. 925-941 ◽  
Author(s):  
G. MURPHY ◽  
C. D. PILCHER ◽  
S. M. KEATING ◽  
R. KASSANJEE ◽  
S. N. FACENTE ◽  
...  

SUMMARYIn 2011 the Incidence Assay Critical Path Working Group reviewed the current state of HIV incidence assays and helped to determine a critical path to the introduction of an HIV incidence assay. At that time the Consortium for Evaluation and Performance of HIV Incidence Assays (CEPHIA) was formed to spur progress and raise standards among assay developers, scientists and laboratories involved in HIV incidence measurement and to structure and conduct a direct independent comparative evaluation of the performance of 10 existing HIV incidence assays, to be considered singly and in combinations as recent infection test algorithms. In this paper we report on a new framework for HIV incidence assay evaluation that has emerged from this effort over the past 5 years, which includes a preliminary target product profile for an incidence assay, a consensus around key performance metrics along with analytical tools and deployment of a standardized approach for incidence assay evaluation. The specimen panels for this evaluation have been collected in large volumes, characterized using a novel approach for infection dating rules and assembled into panels designed to assess the impact of important sources of measurement error with incidence assays such as viral subtype, elite host control of viraemia and antiretroviral treatment. We present the specific rationale for several of these innovations, and discuss important resources for assay developers and researchers that have recently become available. Finally, we summarize the key remaining steps on the path to development and implementation of reliable assays for monitoring HIV incidence at a population level.


2011 ◽  
pp. 316-333
Author(s):  
Håvard D. Jorgensen ◽  
John Krogstie

This chapter presents a novel approach to the development, integration, and operation of virtual enterprises (VEs). The approach is based on the idea of interactive models. An interactive model is a visual model of enterprise aspects that can be viewed, traversed, analyzed, simulated, adapted, and executed by the participants of the VE. The approach has been developed in several research projects, where experiences from industrial case studies are used as a basis for validation and further enhancement. A major result of this work is the model-driven infrastructure that integrates and supports VEs. The main innovative contributions of this infrastructure include concurrent modelling, metamodelling, management and performance of work, integrated support for ad hoc and structured processes, and customizable model- and process-driven integration.


Author(s):  
Dhananjay Singh ◽  
Hoon-Jae Lee

This chapter introduces the Proactive Micro Mobility (PMM) Protocol for the optimization of network load. We present a novel approach to design and analyze IP micro-mobility protocols. The cellular Micro Mobility Protocol provides passive connectivity in an intra domain. The PMM Protocol optimizes miss-routed packet loss in Cellular IP under handoff conditions and during time delay. A comparison is made between the PMM Protocol and the Cellular IP showing that they offer equivalent performance in terms of higher bit rates and optimum value. A mathematical analysis shows that the PMM Protocol performs better than the Cellular IP at 1 MHz clock speed and 128 kbps down link bit rate. The simulation shows that a short route updating time is required in order to guarantee accuracy in mobile unit tracking. The optimal rate of packet loss in the PMM Protocol in a Cellular IP are analyzes route update time. The results show that no miss-routed packets are found during handoff.


Sign in / Sign up

Export Citation Format

Share Document