Pub Date : 2008-12-23DOI: 10.1109/INMIC.2008.4777715
F. Wali, D. Knotter, F. Kuper
Semiconductor industry faces a continuous challenge to decrease the transistor size as well as to increase the yield by eliminating defect sources. One of the sources of particle defects is ultra pure water used in different production tools at different stages of processing. In this paper, particle count data measured in ultra pure water is related to the yield of two large size products. An impact of nanoparticle present in ultra pure water on yield of up to 4-6 % has been found in two different products.
{"title":"Impact of nano particles on semiconductor manufacturing","authors":"F. Wali, D. Knotter, F. Kuper","doi":"10.1109/INMIC.2008.4777715","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777715","url":null,"abstract":"Semiconductor industry faces a continuous challenge to decrease the transistor size as well as to increase the yield by eliminating defect sources. One of the sources of particle defects is ultra pure water used in different production tools at different stages of processing. In this paper, particle count data measured in ultra pure water is related to the yield of two large size products. An impact of nanoparticle present in ultra pure water on yield of up to 4-6 % has been found in two different products.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"42 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113941946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-23DOI: 10.1109/INMIC.2008.4777785
S. T. Gul, C. Moy, J. Palicot
Design of software defined radio (SDR) systems is very challenging because it is very difficult to design a system that preserves most of the properties of the ideal software radio while being realizable with current day technology. The complexity of such systems is the bottleneck and without a careful design approach, no feasible realization may appear. This article introduces a new methodology for selecting the common operators to design SDR. It aims at minimizing the resources use. An SDR consists of software components whose behavior can be changed by reconfiguration procedure. In a common operator design this change requires only an adjustment of certain parameters. In order to optimize the choice of these operators we first make an oriented graph that shows the interrelationship between various components of the system. Then, an architectural exploration extracts the common operators of a given multi-standard system. The need for optimization in software defined radios is underlined and the two selected techniques for the optimization are thoroughly described. The benefits of simulating annealing (SA) technique are exemplified by a comparison with exhaustive search strategies for optimization.
{"title":"Graphical modeling and optimization of air interface standards for Software Defined Radios","authors":"S. T. Gul, C. Moy, J. Palicot","doi":"10.1109/INMIC.2008.4777785","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777785","url":null,"abstract":"Design of software defined radio (SDR) systems is very challenging because it is very difficult to design a system that preserves most of the properties of the ideal software radio while being realizable with current day technology. The complexity of such systems is the bottleneck and without a careful design approach, no feasible realization may appear. This article introduces a new methodology for selecting the common operators to design SDR. It aims at minimizing the resources use. An SDR consists of software components whose behavior can be changed by reconfiguration procedure. In a common operator design this change requires only an adjustment of certain parameters. In order to optimize the choice of these operators we first make an oriented graph that shows the interrelationship between various components of the system. Then, an architectural exploration extracts the common operators of a given multi-standard system. The need for optimization in software defined radios is underlined and the two selected techniques for the optimization are thoroughly described. The benefits of simulating annealing (SA) technique are exemplified by a comparison with exhaustive search strategies for optimization.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123860855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777725
F. A. Afsar, M. Akram, M. Arif, J. Khurshid
This paper renders a fuzzy nearest neighbor classifier with data pruning to reduce the number of stored prototypes to minimize memory and computational time requirements. The incorporation of fuzzy set theory into nearest neighbor classification makes the decision process more flexible and adaptable to noise in the data. We have also embodied an efficient approach for nearest neighbor search in our algorithm which results in significant reduction in computational time during training and classification. We present results of classification of different data sets from the University of California, Irvine (UCI) machine learning repository to illustrate the effectiveness of the suggested approach for classification purposes. We also give an application of the proposed classification methodology to electrocardiogram (ECG) based recognition of 9 types of arrhythmias using wavelet domain features. The results obtained (~97% accuracy), clearly indicate the effectiveness of this algorithm in the design of a practical ECG analyzer.
{"title":"A pruned fuzzy k-nearest neighbor classifier with application to electrocardiogram based cardiac arrhytmia recognition","authors":"F. A. Afsar, M. Akram, M. Arif, J. Khurshid","doi":"10.1109/INMIC.2008.4777725","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777725","url":null,"abstract":"This paper renders a fuzzy nearest neighbor classifier with data pruning to reduce the number of stored prototypes to minimize memory and computational time requirements. The incorporation of fuzzy set theory into nearest neighbor classification makes the decision process more flexible and adaptable to noise in the data. We have also embodied an efficient approach for nearest neighbor search in our algorithm which results in significant reduction in computational time during training and classification. We present results of classification of different data sets from the University of California, Irvine (UCI) machine learning repository to illustrate the effectiveness of the suggested approach for classification purposes. We also give an application of the proposed classification methodology to electrocardiogram (ECG) based recognition of 9 types of arrhythmias using wavelet domain features. The results obtained (~97% accuracy), clearly indicate the effectiveness of this algorithm in the design of a practical ECG analyzer.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777783
S. Hussain, M. Qadir
Fault monitoring is an important concern to be addressed for distributed system. With the help of an efficient fault monitoring scheme, it would be easy to determine the crash and quickly take the recovery steps. Fault monitor typically detects faults by sending and receiving messages to remote objects. We enhanced our technique ACID further with experimenting with giving precedence to the most recent response in the queue and reducing the influence factor of the last response. We tested the enhanced technique eACID to the parameters i.e. adaptiveness to the environment, convergence to the optimal value of timeout and self intelligence for not loading or pushing the object that is being monitored . We experimented with our technique along with some other proposed techniques, our scheme; eACID gave better results when compared with the schemes.
{"title":"Enhanced adaptive, convergent and intelligent fault monitoring in distributed systems (eACID): Working and analysis","authors":"S. Hussain, M. Qadir","doi":"10.1109/INMIC.2008.4777783","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777783","url":null,"abstract":"Fault monitoring is an important concern to be addressed for distributed system. With the help of an efficient fault monitoring scheme, it would be easy to determine the crash and quickly take the recovery steps. Fault monitor typically detects faults by sending and receiving messages to remote objects. We enhanced our technique ACID further with experimenting with giving precedence to the most recent response in the queue and reducing the influence factor of the last response. We tested the enhanced technique eACID to the parameters i.e. adaptiveness to the environment, convergence to the optimal value of timeout and self intelligence for not loading or pushing the object that is being monitored . We experimented with our technique along with some other proposed techniques, our scheme; eACID gave better results when compared with the schemes.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126950883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777796
Q. Ahmad, I. Sarwar
Farmers, specifically of developing countries, face problems like soil attrition, yield losses, reduced market prices, increased pesticides costs and economic barriers. These problems prevent these cultivators from adopting modern farming strategies and hence render them vulnerable. However, these farmers can use pre-hand information to make informed decisions with respect to all agricultural operation. We propose an agriculture information system (Agr-IS) based on ICTs and e-government infrastructure for the benefit of rural farmers by educating them on different aspects of sustainable agriculture (SA). The core functionality of proposed information system is supported by an intelligent Agro-DSS which receives information for various governmental agencies and dispatches the relevant information to the lower end farmers. Agro-DSS works in collaboration with Agr-IS, various other open source software (like Asterisk server), and SOA-based e-government infrastructure for the dissemination of up-to-date agricultural information in a readily accessible and easily understood form, to farmers, agricultural researchers, and advisers. In order to improve the governmental involvement in agriculture to leverage agricultural reforms, the capabilities of SOA are exploited using SOA-based e-government infrastructure. It will help significantly in bridging the gap between rural farmers and governmental agencies. With a diverse biophysical and socio-economic data and knowledge, the presented infrastructure will help reduce the uncertainty and improve decision making process by providing access to data, procedures and analytical capability.
{"title":"An intelligent agri-information dissemination framework: An e-Government","authors":"Q. Ahmad, I. Sarwar","doi":"10.1109/INMIC.2008.4777796","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777796","url":null,"abstract":"Farmers, specifically of developing countries, face problems like soil attrition, yield losses, reduced market prices, increased pesticides costs and economic barriers. These problems prevent these cultivators from adopting modern farming strategies and hence render them vulnerable. However, these farmers can use pre-hand information to make informed decisions with respect to all agricultural operation. We propose an agriculture information system (Agr-IS) based on ICTs and e-government infrastructure for the benefit of rural farmers by educating them on different aspects of sustainable agriculture (SA). The core functionality of proposed information system is supported by an intelligent Agro-DSS which receives information for various governmental agencies and dispatches the relevant information to the lower end farmers. Agro-DSS works in collaboration with Agr-IS, various other open source software (like Asterisk server), and SOA-based e-government infrastructure for the dissemination of up-to-date agricultural information in a readily accessible and easily understood form, to farmers, agricultural researchers, and advisers. In order to improve the governmental involvement in agriculture to leverage agricultural reforms, the capabilities of SOA are exploited using SOA-based e-government infrastructure. It will help significantly in bridging the gap between rural farmers and governmental agencies. With a diverse biophysical and socio-economic data and knowledge, the presented infrastructure will help reduce the uncertainty and improve decision making process by providing access to data, procedures and analytical capability.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114144009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777739
Q. Emad ul Haq, M. Javed, Q. Sami ul Haq
Iris recognition has emerged as a vital and tested methodology for research investigations and routine security applications in the context of increasing security requirements. Thus biometrics has attained a very significant place in human verification and identification. In this paper, an efficient and precised methodology is brought out through using Fisher linear discriminant analysis method and principal component analysis method. These methodologies create different sections in low dimensional sub space. The suggested system in this research work contains four components i.e. preprocessing, segmentation, feature extraction and matching. The preprocessing part again consist of pupil localization, image refinement, iris localization and normalization procedures. The suggested algorithm in this research paper was tested on CASIA Iris image database. The soundness and time efficiency of the suggested algorithm proves it as perfect technique for real time applications.
{"title":"Efficient and robust approach of iris recognition through Fisher Linear Discriminant Analysis method and Principal Component Analysis method","authors":"Q. Emad ul Haq, M. Javed, Q. Sami ul Haq","doi":"10.1109/INMIC.2008.4777739","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777739","url":null,"abstract":"Iris recognition has emerged as a vital and tested methodology for research investigations and routine security applications in the context of increasing security requirements. Thus biometrics has attained a very significant place in human verification and identification. In this paper, an efficient and precised methodology is brought out through using Fisher linear discriminant analysis method and principal component analysis method. These methodologies create different sections in low dimensional sub space. The suggested system in this research work contains four components i.e. preprocessing, segmentation, feature extraction and matching. The preprocessing part again consist of pupil localization, image refinement, iris localization and normalization procedures. The suggested algorithm in this research paper was tested on CASIA Iris image database. The soundness and time efficiency of the suggested algorithm proves it as perfect technique for real time applications.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128554240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777805
S.W. Shah, M. I. Babar, M. N. Arbab, K. Yahya, G. Ahmad, T. Adnan, A. Masood
This paper describes the design and implementation of two alternative techniques for jamming cell-phone communication, noise attack and spectrum distortion technique. Foreign leading electronic companies have already introduced the first technique of jamming through noise attack or denial of service, in market. Our aim is to come up with a new technique which is more robust and cost effective. In this research paper, we have compared the performance of old jamming technique with the new technique in various aspects like cost, power consumption, design complexity, robustness, coverage area, components availability and performance.
{"title":"Cell phone jammer","authors":"S.W. Shah, M. I. Babar, M. N. Arbab, K. Yahya, G. Ahmad, T. Adnan, A. Masood","doi":"10.1109/INMIC.2008.4777805","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777805","url":null,"abstract":"This paper describes the design and implementation of two alternative techniques for jamming cell-phone communication, noise attack and spectrum distortion technique. Foreign leading electronic companies have already introduced the first technique of jamming through noise attack or denial of service, in market. Our aim is to come up with a new technique which is more robust and cost effective. In this research paper, we have compared the performance of old jamming technique with the new technique in various aspects like cost, power consumption, design complexity, robustness, coverage area, components availability and performance.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128649910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777745
M. Zarei, K. Faez, J.M. Nya
In this paper a new on-demand routing protocol for mobile ad hoc networks is presented based on link/route stability estimation. AODV decreases maintenance overhead in ad hoc networks, but some path breaks can significantly cause overhead. Reverse AODV (RAODV) routing algorithm is one of the AODV versions which reduces overhead of routing. Here, we applied link/route stability in RAODV for decrease overhead of discovery and maintenance of routing, a new protocol then was created. Our protocol also increased the packet delivery ratio in mobile ad hoc networks (MANET's). When an active route fails, the source node with the awareness of stabilities of routes, can select the best route in set of available routes. We proposed a stability estimation method and applied that in an optimized version of ad hoc on demand distance vector (AODV) routing algorithm by doing some modification at RAODV algorithm. In our algorithm namely Modified Reverse Ad Hoc On-demand Vector (MRAODV), the route request packet didn't change and it is like as AODV, but rout reply packet must be changed for route stability estimation purpose. Computer simulation using ns-2 simulator was performed to compare with other methods and effectiveness of the proposed method was quantitatively validated.
{"title":"Modified Reverse AODV routing algorithm using route stability in mobile ad hoc networks","authors":"M. Zarei, K. Faez, J.M. Nya","doi":"10.1109/INMIC.2008.4777745","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777745","url":null,"abstract":"In this paper a new on-demand routing protocol for mobile ad hoc networks is presented based on link/route stability estimation. AODV decreases maintenance overhead in ad hoc networks, but some path breaks can significantly cause overhead. Reverse AODV (RAODV) routing algorithm is one of the AODV versions which reduces overhead of routing. Here, we applied link/route stability in RAODV for decrease overhead of discovery and maintenance of routing, a new protocol then was created. Our protocol also increased the packet delivery ratio in mobile ad hoc networks (MANET's). When an active route fails, the source node with the awareness of stabilities of routes, can select the best route in set of available routes. We proposed a stability estimation method and applied that in an optimized version of ad hoc on demand distance vector (AODV) routing algorithm by doing some modification at RAODV algorithm. In our algorithm namely Modified Reverse Ad Hoc On-demand Vector (MRAODV), the route request packet didn't change and it is like as AODV, but rout reply packet must be changed for route stability estimation purpose. Computer simulation using ns-2 simulator was performed to compare with other methods and effectiveness of the proposed method was quantitatively validated.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132047692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777775
A. H. Farooqi, Ali Munir
IP multimedia subsystem (IMS) is a new next generation networking architecture that will provide better quality of service, charging infrastructure and security. The basic idea behind IMS is convergence; providing a single interface to different traditional or modern networking architectures allowing better working environment for the end users. IMS is still not commercially adopted and used but research is in progress to explore it. IMS is an IP based overlay next generation network architecture. It inherent number of security threats of session initiation protocol (SIP), TCP, UDP etc as it uses SIP and IP protocols. Some of them can degrade the performance of IMS seriously and may cause DoS or DDoS attacks. The paper presents a new approach keeping a vision of secure IMS based on intrusion detection system (IDS) using k-nearest neighbor (KNN) as classifier. The KNN classifier can effectively detect intrusive attacks and achieve a low false positive rate. It can distinguish between the normal behavior of the system or abnormal. In this paper, we have focused on the key element of IMS core known as proxy call session control function (PCSCF). Network based anomaly detection mechanism is proposed using KNN as anomaly detector. Experiments are performed on OpenIMS core and the result shows that IMS is vulnerable to different types of attacks such as UDP flooding, IP spoofing that can cause DoS. KNN classifier effectively distinguishes the behavior of the system as normal or intrusive and achieve low false positive rate.
{"title":"Intrusion Detection System for IP Multimedia Subsystem using K-Nearest Neighbor classifier","authors":"A. H. Farooqi, Ali Munir","doi":"10.1109/INMIC.2008.4777775","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777775","url":null,"abstract":"IP multimedia subsystem (IMS) is a new next generation networking architecture that will provide better quality of service, charging infrastructure and security. The basic idea behind IMS is convergence; providing a single interface to different traditional or modern networking architectures allowing better working environment for the end users. IMS is still not commercially adopted and used but research is in progress to explore it. IMS is an IP based overlay next generation network architecture. It inherent number of security threats of session initiation protocol (SIP), TCP, UDP etc as it uses SIP and IP protocols. Some of them can degrade the performance of IMS seriously and may cause DoS or DDoS attacks. The paper presents a new approach keeping a vision of secure IMS based on intrusion detection system (IDS) using k-nearest neighbor (KNN) as classifier. The KNN classifier can effectively detect intrusive attacks and achieve a low false positive rate. It can distinguish between the normal behavior of the system or abnormal. In this paper, we have focused on the key element of IMS core known as proxy call session control function (PCSCF). Network based anomaly detection mechanism is proposed using KNN as anomaly detector. Experiments are performed on OpenIMS core and the result shows that IMS is vulnerable to different types of attacks such as UDP flooding, IP spoofing that can cause DoS. KNN classifier effectively distinguishes the behavior of the system as normal or intrusive and achieve low false positive rate.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130442329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2008-12-01DOI: 10.1109/INMIC.2008.4777716
S. Fazli, M. Kiamini
In this paper, we present a novel method to embed secret message in the cover-image so that the interceptors will not notice about the existence of the hidden data. The basic concept of the proposed method is by simple Least Significant Bit (LSB) substitution. In order to improve the quality of stego-image and to increase the secret message capacity and security level, we inspire by the work of Li and Wang which splits the cover-image into n blocks of 8 times 8 pixels and the secret message into n partitions. Then we apply Particle Swarm Optimization (PSO) algorithm to search approximate optimal solutions and to find an optimal substitution matrix for transforming the secret message in each block, instead of finding only one optimal substitution matrix for the whole cover-image as in. The quality of the resulting stegoimage, the secret message capacity and the security level of the proposed method are calculated and compared to other methods. Experimental results show that the proposed method outperforms the JPEG and Quantization Table Modification (JQTM) method and the Li and Wang's work in image quality, embedding capacity and security level.
{"title":"A high_performance steganographic method using JPEG and PSO algorithm","authors":"S. Fazli, M. Kiamini","doi":"10.1109/INMIC.2008.4777716","DOIUrl":"https://doi.org/10.1109/INMIC.2008.4777716","url":null,"abstract":"In this paper, we present a novel method to embed secret message in the cover-image so that the interceptors will not notice about the existence of the hidden data. The basic concept of the proposed method is by simple Least Significant Bit (LSB) substitution. In order to improve the quality of stego-image and to increase the secret message capacity and security level, we inspire by the work of Li and Wang which splits the cover-image into n blocks of 8 times 8 pixels and the secret message into n partitions. Then we apply Particle Swarm Optimization (PSO) algorithm to search approximate optimal solutions and to find an optimal substitution matrix for transforming the secret message in each block, instead of finding only one optimal substitution matrix for the whole cover-image as in. The quality of the resulting stegoimage, the secret message capacity and the security level of the proposed method are calculated and compared to other methods. Experimental results show that the proposed method outperforms the JPEG and Quantization Table Modification (JQTM) method and the Li and Wang's work in image quality, embedding capacity and security level.","PeriodicalId":112530,"journal":{"name":"2008 IEEE International Multitopic Conference","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131089254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}