Work place: Department of Computer Science and Engineering, Hajee Mohammad Danesh Science and Technology University, Dinajpur-5200, Bangladesh
E-mail: emran.cse@hstu.ac.bd
Website:
Research Interests: Image Processing, Information Security, Artificial Intelligence
Biography
Emran Ali received the Bachelor of Science in Computer Science and Engineering from Hajee Mohammad Danesh Science and Technology University (HSTU), Dinajpur-5200, Bangladesh in the year of 2010. From February 2012 to August 2014 he worked on Software and Application development for Smartphone in various software firms in the country. In September 2014, he joined as a Lecturer in the department of Computer Science and Engineering, HSTU, Dinajpur-5200, Bangladesh. His research interest includes Information Security and Cryptanalysis, Artificial Intelligence, Image Processing, Bio-informatics and IoT.
By U. A. Md. Ehsan Ali Emran Ali Md. Sohrawordi Md. Nahid Sultan
DOI: https://doi.org/10.5815/ijmsc.2021.03.03, Pub. Date: 8 Aug. 2021
Security in digital communication is becoming more important as the number of systems is connected to the internet day by day. It is necessary to protect secret message during transmission over insecure channels of the internet. Thus, data security becomes an important research issue. Steganography is a technique that embeds secret information into a carrier such as images, audio files, text files, and video files so that it cannot be observed. In this paper, based on spatial domain, a new image steganography method is proposed to ensure the privacy of the digital data during transmission over the internet. In this method, least significant bit substitution is proposed where the information embedded in the random bit position of a random pixel location of the cover image using Pseudo Random Number Generator (PRNG). The proposed method used a 3-3-2 approach to hide a byte in a pixel of a 24 bit color image. The method uses Pseudo Random Number Generator (PRNG) in two different stages of embedding process. The first one is used to select random pixels and the second PRNG is used select random bit position into the R, G and B values of a pixel to embed one byte of information. Due to this randomization, the security of the system is expected to increase and the method achieves a very high maximum hiding capacity which signifies the importance of the proposed method.
[...] Read more.By Md. Arshad Ali Emran Ali Md. Ahsan Habib Md. Nadim Takuya Kusaka Yasuyuki Nogami
DOI: https://doi.org/10.5815/ijcnis.2017.09.07, Pub. Date: 8 Sep. 2017
In this paper, the authors have proposed an innovative approach for generating a pseudo random ternary sequence by using a primitive polynomial, trace function, and Legendre symbol over odd characteristics field. Let p be an odd prime number, FP be an odd characteristic prime field, and m be the degree of the primitive polynomial f(x) Let w be its zero and a primitive element in Fpm* In the beginning, a primitive polynomial f(x) generates maximum length vector sequence, then the trace function Tr(.) is used to map an element of the extension field (Fpm) to an element of the prime field Fp then non-zero scalar A∈Fp is added to the trace value, and finally the Legendre symbol (a/p) is utilized to map the scalars into ternary sequence having the values, {0,1,and -1} By applying the new parameter A the period of the sequence is extended to its maximum value that is n=pm-1 Hence, our proposed sequence has some parameters such as p,m,and A This paper mathematically explains the properties of the proposed ternary sequence such as period and autocorrelation. Additionally, these properties are also justified based on some experimental results.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals