Friday 24 February 2012

WEEK 5 FYP1



Title:
MATLAB Basic Class

Objective:
To explore about MATLAB Basic Features

Content/Result:
This week I explored about MATLAB features and function. I refer to this link: http://www.mathworks.com/help/ as well as some notes given by Madam Lily. Below are some of the examples of my learning.

1) To display text
a=input('Have a nice day!');
disp(a)

b=input('GOOD LUCK IN YOUR EXAM');
disp(b)

c=input('Hello everyone');
disp(c)


2)Vector
A = [ [1 2 3]' [3 2 1]' [2 1 3]'];
B = A;
for j=2:3,
A(j,:) = A(j,:) - A(j-1,:)
end

Output: A = 1     3     2
                   1    -1    -1
                   3     1     3

A = 1     3     2
       1    -1    -1
       2     2     4


3) The Colon Notation
1:4

ans =

     1     2     3     4

3:7

ans =

     3     4     5     6     7


Conclusion:
Through this exercise and tutorial, I'll be able to recognize the features in MATLAB for my future used in my project.





Friday 17 February 2012

WEEK 4 FYP 1



Title:
Techniques for Image Steganography

Objective:
To research and understand the techniques used in Image Steganography

Content/Result:
To hide a message inside an image without changing its visible properties, the cover source can be altered in ”noisy”areas with many color variations, so less attention will be drawn to the modifications. The most common methods to make these alterations involve the usage of the least-significant bit (LSB), masking, filtering and transformations on the cover image. These techniques can be used with varying degrees of success on different types of image files.

a) Least Significant Bit (LSB)
The simplest steganography techniques embed the bits of the message directly into least significant bit plane of the cover image in a deterministic sequence. Modulating the least significant bit does not result in human-perceptible difference because the amplitude of the change is small

b) Masking and Filtering
Masking and filtering techniques, usually restricted to 24 bits or grayscale images, take a different approach to hiding a message. These methods are effectively similar to paper watermarks, creating markings in an image. This can be achieved for example by modifying the luminance of parts of the image.

c) Transformation
A more complex way of hiding a secret inside an image comes with the use and modifications of discrete cosine transformations. Discrete cosine transformations (DST)), are used by the JPEG compression algorithm to transform successive 8 x 8 pixel blocks of the image, into 64 DCT coefficients each. Each DCT coefficient F(u, v) of an 8 x 8 block of image pixels f(x, y) is given by:


Conclusion:
The most common techniques used in Image Steganography is Least Significant Bit (LSB), Masking and Filtering, and also Transformation.







Friday 10 February 2012

WEEK 3 FYP 1



Title: 
What is Steganography?

Objective
To find and research information about Steganography.

Content/Result: 
  • Steganography is the art of passing information in a manner that the very existence of the message is unknown. Originally used to hide secret messages to avoid detection, steganography also serves as a method of protecting copyrights for digital works. 
  • Stego, as it is often referred to, differs from it’s close relative, cryptography, in that with crypto, messages are garbled up so they are unreadable and make no coherent sense. However, the fact that a message was sent is known, whereas with the use of steganography, the sender is concealing the existence of a message. 
  • Steganography has been given a boost in the internet age as governments attempt to regulate or prohibit the use of cryptography for personal privacy purposes.
  •  There exist two types of materials in steganography; message and carrier. Message is the secret data that should be hidden and carrier is the material that takes the message in it.
  • 3 types of Steganography which is 




Conclusion:
Steganography is process or method for hiding data/message inside another data/message. There are 3 types of steganography which is Image, Text and Audio. Every types of it have several methods to hiding the data.