Gandharba Swain
K L University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Gandharba Swain.
2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS) | 2016
Anita Pradhan; Aditya Kumar Sahu; Gandharba Swain; K. Raja Sekhar
This paper illustrates the various performance evaluation parameters of image steganography techniques. The performance of a steganographic technique can be rated by three parameters; (i) hiding capacity, (ii) distortion measure and (iii) security. The hiding capacity means the maximum amount of information that can be hidden in an image. It can also be represented as the number of bits per pixel. The distortion is measured by using various metrics like mean square error, root mean square error, PSNR, quality index, correlation, structural similarity index etc. Each of these metrics can be represented mathematically. The security can be evaluated by testing the steganography technique with the steganalysis schemes like pixel difference histogram analysis, RS analysis etc. All these metrics are illustrated with mathematical equations. Finally, some future directions are also highlighted at the end of the paper.
Security and Communication Networks | 2017
Anita Pradhan; K. Raja Sekhar; Gandharba Swain
The traditional pixel value differencing (PVD) steganographical schemes are easily detected by pixel difference histogram (PDH) analysis. This problem could be addressed by adding two tricks: (i) utilizing horizontal, vertical, and diagonal edges and (ii) using adaptive quantization ranges. This paper presents an adaptive PVD technique using 6-pixel blocks. There are two variants. The proposed adaptive PVD for -pixel blocks is known as variant 1, and the proposed adaptive PVD for -pixel blocks is known as variant 2. For every block in variant 1, the four corner pixels are used to hide data bits using the middle column pixels for detecting the horizontal and diagonal edges. Similarly, for every block in variant 2, the four corner pixels are used to hide data bits using the middle row pixels for detecting the vertical and diagonal edges. The quantization ranges are adaptive and are calculated using the correlation of the two middle column/row pixels with the four corner pixels. The technique performs better as compared to the existing adaptive PVD techniques by possessing higher hiding capacity and lesser distortion. Furthermore, it has been proven that the PDH steganalysis and RS steganalysis cannot detect this proposed technique.
Cybernetics and Information Technologies | 2018
Aditya Kumar Sahu; Gandharba Swain; E. Suresh Babu
Abstract This article proposes bit flipping method to conceal secret data in the original image. Here a block consists of 2 pixels and thereby flipping one or two LSBs of the pixels to hide secret information in it. It exists in two variants. Variant-1 and Variant-2 both use 7th and 8th bit of a pixel to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the Variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, Peak Signal to Noise Ratio (PSNR), hiding capacity, and the Quality Index (Q.I) of the proposed techniques has been compared with the results of the existing bit flipping technique and some of the state of art article.
Security and Communication Networks | 2018
Gandharba Swain
The combination of pixel value differencing (PVD) and least significant bit (LSB) substitution gives higher capacity and lesser distortion. However, there are three issues to be taken into account: (i) fall off boundary problem (FOBP), (ii) pixel difference histogram (PDH) analysis, and (iii) RS analysis. This paper proposes a steganography technique in two variants using combination of modified LSB substitution and PVD by taking care of these three issues. The first variant operates on 2 × 3 pixel blocks and the second technique operates on 3 × 3 pixel blocks. In one of the pixels of a block, embedding is performed using modified LSB substitution. Based on the new value of this pixel, difference values with other neighboring pixels are calculated. Using these differences, PVD approach is applied. The edges in multiple directions are exploited, so PDH analysis cannot detect this steganography. The LSB substitution is performed in only one pixel of the block, so RS analysis also cannot detect this steganography. To address the FOBP, suitable equations are used during embedding procedure. The experimental results such as bit rate and distortion measure are satisfactory.
Mathematical Problems in Engineering | 2018
Anita Pradhan; K. Raja Sekhar; Gandharba Swain
To protect from pixel difference histogram (PDH) analysis and RS analysis, two hybrid image steganography techniques by appropriate combination of LSB substitution, pixel value differencing (PVD), and exploiting modification directions (EMD) have been proposed in this paper. The cover image is traversed in raster scan order and partitioned into blocks. The first technique operates on 2 × 2 pixel blocks and the second technique operates on 3 × 3 pixel blocks. For each block, the average pixel value difference, , is calculated. If value is greater than 15, the block is in an edge area, so a combination of LSB substitution and PVD is applied. If value is less than or equal to 15, the block is in a smooth area, so a combination of LSB substitution and EMD is applied. Each of these two techniques exists in two variants (Type 1 and Type 2) with respect to two different range tables. The hiding capacities and PSNR of both the techniques are found to be improved. The results from experiments prove that PDH analysis and RS analysis cannot detect these proposed techniques.
SpringerPlus | 2016
Ranjan K. Senapati; P. M. K. Prasad; Gandharba Swain; T. N. Shankar
This paper presents a listless variant of a modified three-dimensional (3D)-block coding algorithm suitable for medical image compression. A higher degree of correlation is achieved by using a 3D hybrid transform. The 3D hybrid transform is performed by a wavelet transform in the spatial dimension and a Karhunen–Loueve transform in the spectral dimension. The 3D transformed coefficients are arranged in a one-dimensional (1D) fashion, as in the hierarchical nature of the wavelet-coefficient distribution strategy. A novel listless block coding algorithm is applied to the mapped 1D coefficients which encode in an ordered-bit-plane fashion. The algorithm originates from the most significant bit plane and terminates at the least significant bit plane to generate an embedded bit stream, as in 3D-SPIHT. The proposed algorithm is called 3D hierarchical listless block (3D-HLCK), which exhibits better compression performance than that exhibited by 3D-SPIHT. Further, it is highly competitive with some of the state-of-the-art 3D wavelet coders for a wide range of bit rates for magnetic resonance, digital imaging and communication in medicine and angiogram images. 3D-HLCK provides rate and resolution scalability similar to those provided by 3D-SPIHT and 3D-SPECK. In addition, a significant memory reduction is achieved owing to the listless nature of 3D-HLCK.
Multimedia Tools and Applications | 2016
Gandharba Swain
Procedia Computer Science | 2016
Gandharba Swain
Indian journal of science and technology | 2016
Anita Pradhan; K. Raja Sekhar; Gandharba Swain
Procedia Computer Science | 2016
Gandharba Swain