T
E
L
K
O
M
N
I
K
A
T
elec
o
m
m
un
ica
t
io
n,
Co
m
pu
t
ing
,
E
lect
ro
nics
a
nd
Co
ntr
o
l
Vo
l.
18
,
No
.
6
,
Dec
em
b
er
2
0
2
0
,
p
p
.
2
9
2
8
~2
9
3
8
I
SS
N:
1
6
9
3
-
6
9
3
0
,
ac
cr
ed
ited
First Gr
ad
e
b
y
Kem
en
r
is
tek
d
i
k
ti,
Dec
r
ee
No
: 2
1
/E/KPT
/2
0
1
8
DOI
: 1
0
.
1
2
9
2
8
/TE
L
KOM
NI
K
A.
v
1
8
i6
.
1
5
8
4
7
2928
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//jo
u
r
n
a
l.u
a
d
.
a
c.
id
/in
d
ex
.
p
h
p
/TELK
OM
N
I
K
A
Dua
l method
cry
ptog
ra
phy
ima
g
e by
two forc
e secu
re
a
nd
steg
a
no
g
ra
phy
secret
m
ess
a
g
e in
Io
T
M
a
is
a
'a
Abid
Ali K
.
Al
-
Da
bb
a
s
1
,
Ash
wa
k
Ala
ba
ichi
2
,
Ah
m
ed
Sa
leem
Abba
s
3
1
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
,
Un
iv
e
rsit
y
o
f
Tec
h
n
o
lo
g
y
,
Ira
q
2
Co
ll
e
g
e
o
f
En
g
i
n
e
e
rin
g
De
p
a
rtm
e
n
t
o
f
B
io
m
e
d
ica
l
E
n
g
i
n
e
e
rin
g
,
U
n
iv
e
rsit
y
o
f
Ke
rb
a
la,
Ira
q
3
Co
ll
e
g
e
o
f
In
f
o
rm
a
ti
o
n
Tec
h
n
o
lo
g
y
,
De
p
a
rtme
n
t
o
f
S
o
ftwa
re
,
U
n
i
v
e
rsity
o
f
Ba
b
y
lo
n
,
Ira
q
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Feb
1
7
,
2
0
2
0
R
ev
is
ed
J
u
n
1
1
,
2
0
2
0
Acc
ep
ted
J
u
l 6
,
2
0
2
0
W
i
t
h
t
h
e
g
o
o
n
t
h
e
e
v
o
l
u
t
i
o
n
o
f
b
o
t
h
c
o
m
p
u
t
e
r
a
n
d
i
n
t
e
r
n
e
t
t
e
c
h
n
o
l
o
g
y
,
v
i
d
e
o
s
,
s
o
u
n
d
s
,
a
n
d
s
c
r
i
p
t
s
a
r
e
u
s
e
d
m
o
r
e
a
n
d
m
o
r
e
o
f
t
e
n
.
I
t
c
a
n
b
e
u
s
e
d
i
n
s
u
n
d
r
y
t
e
c
h
n
i
q
u
e
s
i
n
c
i
p
h
e
r
i
n
g
a
n
d
d
a
t
a
c
o
n
c
e
a
l
i
n
g
.
T
h
e
o
b
j
e
c
t
i
v
e
o
f
t
h
i
s
p
a
p
e
r
i
s
l
e
a
d
i
n
g
t
o
t
h
e
s
u
g
g
e
s
t
i
o
n
o
f
a
n
e
w
m
e
t
h
o
d
o
f
t
h
e
c
o
m
b
i
n
a
t
i
o
n
b
e
t
w
e
e
n
e
n
c
r
y
p
t
i
o
n
a
n
d
c
o
n
c
e
a
l
m
e
n
t
o
f
i
n
f
o
r
m
a
t
i
o
n
s
o
a
s
t
o
m
a
k
e
i
t
d
i
f
f
i
c
u
l
t
t
o
i
d
e
n
t
i
f
y
t
h
e
t
r
a
n
s
m
i
t
t
e
d
d
a
t
a
v
i
a
n
e
t
w
o
r
k
s
.
T
h
i
s
s
t
u
d
y
h
a
s
u
s
e
d
t
w
o
f
o
r
c
e
s
e
c
u
r
e
(
2
F
S
)
t
o
e
n
c
r
y
p
t
t
h
e
i
m
a
g
e
s
,
i
n
o
t
h
e
r
w
o
r
d
s
,
t
h
e
S
F
i
s
f
r
e
q
u
e
n
t
t
w
i
c
e
o
n
t
h
e
i
m
a
g
e
,
t
o
o
b
t
a
i
n
p
o
w
e
r
f
u
l
e
n
c
r
y
p
t
i
o
n
t
h
e
n
t
h
e
c
o
n
c
e
a
l
i
n
g
o
f
t
h
e
s
e
c
r
e
t
m
e
s
s
a
g
e
i
s
d
o
n
e
i
n
s
i
d
e
t
h
e
c
r
y
p
t
o
g
r
a
p
h
y
o
f
t
h
e
i
m
a
g
e
h
a
s
b
e
e
n
p
e
r
f
o
r
m
e
d
u
s
i
n
g
a
s
e
c
r
e
t
k
e
y
(
c
o
s
i
n
e
c
u
r
v
e
)
,
a
n
d
t
h
i
s
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
h
a
s
b
e
e
n
t
r
a
n
s
f
o
r
m
e
d
f
o
r
t
h
e
I
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
s
t
o
r
a
g
e
i
n
t
h
e
d
a
t
a
b
a
s
e
i
n
I
o
T
(
d
a
t
a
f
l
o
w
)
,
w
h
e
n
t
h
e
u
s
e
r
n
e
e
d
s
a
n
y
i
n
f
o
r
m
a
t
i
o
n
c
a
n
b
e
a
c
c
e
s
s
i
n
v
i
a
o
f
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
(
I
o
T
s
)
.
T
h
e
o
u
t
c
o
m
e
o
f
t
h
e
p
r
o
p
o
s
e
d
s
y
s
t
e
m
i
s
o
b
t
a
i
n
e
d
t
o
b
e
e
v
a
l
u
a
t
e
d
t
h
r
o
u
g
h
d
i
f
f
e
r
e
n
t
m
e
a
s
u
r
e
s
,
s
u
c
h
a
s
p
e
a
k
s
i
g
n
a
l
n
o
i
s
e
r
a
t
i
o
(
P
S
NR
)
,
m
e
a
n
s
q
u
a
r
e
e
r
r
o
r
(
MSE
)
,
e
n
t
r
o
p
y
,
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
,
a
n
d
h
i
s
t
o
g
r
a
m
.
T
h
e
p
r
o
p
o
s
e
d
s
y
s
t
e
m
i
s
g
o
o
d
,
e
f
f
i
c
i
e
n
t
,
f
a
s
t
,
h
a
s
h
i
g
h
s
e
c
u
r
i
t
y
,
r
o
b
u
s
t
n
e
s
s
,
a
n
d
t
r
a
n
s
p
a
r
e
n
c
y
.
K
ey
w
o
r
d
s
:
C
r
y
p
to
g
r
ap
h
y
I
n
ter
n
et
o
f
th
in
g
s
Secr
et
k
ey
Secr
et
m
ess
ag
e
Steg
an
o
g
r
ap
h
y
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r
th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ash
wak
Alab
aich
i,
Dep
ar
tm
en
t o
f
B
io
m
ed
ical
E
n
g
in
ee
r
in
g
,
Un
iv
er
s
ity
o
f
Ker
b
ala
,
Hilla
R
o
ad
,
Fre
h
a,
Ker
b
ala
5
6
0
0
1
,
I
r
aq
.
E
m
ail:
ash
waq
.
alab
aich
i@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
C
ip
h
er
in
g
is
an
o
p
e
r
atio
n
o
f
co
n
v
er
tin
g
d
ata
to
t
h
e
m
o
r
e
s
af
ety
m
ass
iv
e
d
ev
elo
p
m
en
t
o
f
n
etwo
r
k
s
d
ev
ice,
th
e
last
im
p
r
o
v
em
en
t
i
n
d
ig
itate
tech
n
iq
u
es,
th
e
d
ig
it
ate
d
ata
is
a
m
a
s
s
iv
e
am
o
u
n
t
o
f
th
e
ex
is
t
in
g
d
ata
ex
ch
an
g
e
th
r
o
u
g
h
d
if
f
e
r
en
t
k
i
n
d
s
o
f
n
ets
[
1
]
.
T
h
e
s
ec
u
r
ity
f
o
r
th
e
d
ig
ital
p
ictu
r
e
s
b
ec
am
e
m
o
s
t
s
ig
n
if
ican
t
b
ec
au
s
e
o
f
th
e
r
ap
id
in
cr
ea
s
e
o
f
n
etwo
r
k
s
i
n
ter
n
et
an
d
web
in
th
e
u
n
iv
er
s
e
in
th
e
cu
r
r
en
t
tim
e
[
2
]
.
T
h
e
im
ag
e
p
r
o
ce
s
s
o
r
s
an
d
it h
as
wid
e
u
s
e
s
.
T
h
e
wo
r
d
o
f
in
f
o
r
m
atio
n
h
i
d
in
g
ca
m
e
f
r
o
m
two
Gr
ee
k
ter
m
s
,
th
e
f
ir
s
t
ter
m
is
s
teg
o
,
it c
an
b
e
ca
lled
c
o
v
er
i
n
g
,
wh
ile
th
e
s
ec
o
n
d
te
r
m
is
g
r
a
p
h
ical,
it c
an
b
e
ca
lled
wr
ite.
T
h
ese
two
ter
m
s
ar
e
u
s
u
ally
r
en
o
wn
e
d
as
co
v
e
r
in
g
wr
itin
g
o
r
in
f
o
r
m
atio
n
h
id
in
g
.
I
t
ca
n
h
av
e
u
tili
za
tio
n
f
o
r
a
s
ec
u
r
e
co
n
n
ec
tio
n
[
3
]
.
E
m
b
ed
d
in
g
ch
o
o
s
es e
v
er
y
co
v
er
in
g
o
b
ject
(
i.e
.
p
ictu
r
e,
s
o
u
n
d
,
an
d
v
aliu
m
s
)
s
o
as to
o
u
t
p
u
t
s
teg
o
f
o
ld
e
r
o
r
th
e
f
o
ld
er
wh
ich
in
clu
d
e
s
th
e
c
o
n
c
ea
l
d
ata
in
to
it.
Secu
r
ity
is
o
f
m
ajo
r
wo
r
r
y
ev
er
y
d
a
y
f
o
r
d
ig
itals
co
n
n
ec
tio
n
s
.
I
n
w
h
ich
d
ata
is
tr
an
s
m
itted
ac
r
o
s
s
n
ets
o
r
to
a
n
o
th
er
p
er
s
o
n
it
ca
n
b
e
s
ec
u
r
e
.
I
t
u
s
es
to
v
i
ew
th
e
p
r
iv
ac
y
d
ata
r
eq
u
est
th
e
d
ata
h
i
d
in
g
m
et
h
o
d
th
at
m
o
r
e
r
esis
t
co
n
ce
alm
en
t
attac
k
s
.
Her
e,
a
s
ec
u
r
e
co
n
n
ec
t
io
n
is
r
eq
u
ested
f
o
r
th
e
ev
o
lu
tio
n
s
o
f
s
teg
an
o
g
r
ap
h
y
m
eth
o
d
s
[
4
].
I
n
f
o
r
m
atio
n
h
id
in
g
is
ex
p
lain
ed
u
tili
zin
g
th
e
n
ex
t f
o
r
m
u
la
:
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Du
a
l m
eth
o
d
cryp
to
g
r
a
p
h
y
im
a
g
e
b
y
tw
o
fo
r
ce
s
ec
u
r
e
a
n
d
…
(
Ma
is
a
'a
A
b
id
A
li K
.
A
l
-
Da
b
b
a
s
)
2929
−
=
−
+
−
+
−
T
h
e
in
ter
n
et
o
f
th
in
g
s
(
I
o
T
)
i
s
k
n
o
wn
as
a
m
o
d
el
th
at
is
e
q
u
ip
p
e
d
with
s
en
s
o
r
s
,
ac
tu
at
o
r
s
,
an
d
p
r
o
ce
s
s
o
r
s
co
n
n
ec
ted
with
ea
ch
o
th
er
to
s
er
v
e
a
s
ig
n
if
icate
s
p
u
r
p
o
s
e
[
5
].
I
o
T
a
r
c
h
i
t
e
c
t
u
r
e
g
i
v
e
s
a
s
o
l
u
t
i
o
n
d
e
p
e
n
d
i
n
g
o
n
t
h
e
i
n
t
e
g
r
a
t
i
o
n
o
f
d
a
t
a
t
e
c
h
n
o
l
o
g
i
e
s
,
w
h
i
c
h
i
n
d
i
c
a
t
e
s
d
e
v
i
c
e
s
a
n
d
p
r
o
g
r
a
m
s
u
t
i
l
i
z
e
d
i
n
s
a
v
i
n
g
,
r
e
s
t
o
r
i
n
g
,
a
n
d
t
r
e
a
t
m
e
n
t
o
f
d
a
t
a
a
n
d
c
o
m
m
u
n
i
c
a
t
i
o
n
t
e
c
h
n
o
l
o
g
i
e
s
t
h
a
t
c
o
n
t
a
i
n
e
l
e
c
t
r
o
n
i
c
s
s
y
s
t
e
m
s
u
t
i
l
i
z
e
d
t
o
c
o
n
n
e
c
t
p
e
r
s
o
n
s
a
n
d
c
o
l
l
e
c
t
i
o
n
s
[
6
]
.
T
h
e
f
a
s
t
a
p
p
r
o
x
i
m
a
t
e
o
f
d
a
t
a
i
n
c
o
n
n
e
c
t
i
o
n
t
e
c
h
n
o
l
o
g
i
e
s
i
s
c
o
n
s
t
r
u
c
t
e
d
o
n
t
h
e
t
h
i
r
d
s
t
a
g
e
s
o
f
t
e
c
h
n
o
l
o
g
y
i
n
v
e
n
t
i
o
n
:
c
l
o
u
d
c
o
m
p
u
t
i
n
g
,
d
a
t
u
m
,
a
n
d
t
e
l
e
c
o
m
m
u
n
i
c
a
t
i
o
n
t
u
b
e
s
/
n
e
t
s
a
n
d
d
e
v
i
c
e
s
[
7
]
.
S
u
c
h
t
h
e
o
u
t
c
o
m
e
h
a
s
a
p
p
r
o
x
i
m
a
t
e
,
t
h
a
t
I
o
T
s
i
m
p
l
e
m
e
n
t
a
t
i
o
n
d
e
m
a
n
d
s
t
h
e
a
d
a
p
t
i
o
n
o
f
c
l
a
s
s
i
c
i
n
d
u
s
t
r
y
a
n
d
t
h
e
t
e
c
h
n
o
l
o
g
y
w
i
l
l
s
u
p
p
l
y
a
c
h
a
n
c
e
t
o
m
o
d
e
r
n
i
n
d
u
s
t
r
i
e
s
t
o
a
r
i
s
e
a
n
d
t
o
t
r
a
n
s
f
e
r
n
e
w
u
s
e
r
e
x
p
e
r
i
e
n
c
e
s
a
n
d
s
e
r
v
i
c
e
s
[
8
,
9
]
.
T
h
e
co
n
t
r
ib
u
tio
n
o
f
th
is
s
y
s
tem
is
u
s
in
g
two
s
ec
u
r
e
f
o
r
ce
(
2
FS
)
o
r
FS
f
r
e
q
u
en
t
twice
to
en
cr
y
p
tio
n
im
ag
e,
it
ca
n
n
o
t
b
e
u
s
ed
b
ef
o
r
e.
Als
o
,
s
ec
r
et
k
ey
i
s
u
s
ed
b
y
co
s
in
e
cu
r
v
e
to
s
elec
t
th
e
lo
ca
tio
n
s
in
en
cr
y
p
tio
n
im
ag
e
to
h
id
e
th
e
s
ec
r
et
m
ess
ag
e,
an
d
s
av
e
it
i
n
I
o
T
s
in
d
atab
ase.
W
h
en
th
e
attac
k
er
s
tr
y
t
o
d
etec
t
s
ec
r
et
m
ess
ag
es,
th
ey
ca
n
n
o
t
ac
ce
s
s
th
e
d
atab
ase
in
s
er
v
er
.
T
h
e
p
r
o
b
l
e
m
s
i
n
t
h
e
p
r
e
s
e
n
t
t
i
m
e
i
s
a
r
e
s
u
l
t
o
f
i
n
t
e
r
n
e
t
c
o
m
m
u
n
i
c
a
t
i
o
n
s
w
o
r
l
d
w
i
d
e
,
o
n
l
e
v
e
l
s
n
e
t
w
o
r
k
s
,
m
o
b
i
l
e
a
n
d
e
m
a
i
l
.
T
h
e
y
a
r
e
l
e
a
d
i
n
g
t
o
d
i
s
c
o
v
e
r
y
o
f
o
t
h
e
r
n
ew
t
e
c
h
n
i
q
u
e
s
t
o
o
b
t
a
i
n
i
n
f
o
r
m
a
t
i
o
n
s
e
c
u
r
i
t
y
w
h
i
c
h
i
s
p
o
w
e
r
f
u
l
d
u
r
i
n
g
t
r
a
n
s
m
i
s
s
i
o
n
a
n
d
r
e
c
e
i
v
i
n
g
.
A
n
d
w
i
t
h
o
u
t
b
e
i
n
g
w
e
a
k
t
o
a
t
t
a
c
k
e
r
s
o
n
t
h
e
n
e
t
w
o
r
k
s
.
I
n
2
0
1
5
,
P
.
B
en
n
i
an
d
R
.
Hett
y
,
p
r
o
p
o
s
ed
ad
ju
s
tm
en
t
o
f
th
e
C
ae
s
ar
cip
h
er
th
at
r
esu
lts
in
en
cr
y
p
tin
g
tex
ts
,
it
ca
n
b
e
r
ea
d
.
I
t
ca
n
n
o
t
p
er
f
o
r
m
th
e
cr
y
p
tan
aly
s
is
o
f
t
h
e
s
u
s
p
ec
t
in
to
en
c
r
y
p
tio
n
tex
t
.
C
ae
s
ar
en
cr
y
p
tio
n
m
o
d
if
icatio
n
wo
r
k
s
o
n
c
h
an
g
i
n
g
th
e
ch
ar
ac
ter
s
al
p
h
ab
et
f
o
r
t
wo
s
tag
es,
t
h
e
s
o
n
g
p
r
o
p
e
r
f
o
r
alp
h
ab
et.
T
h
ese
ar
e
m
o
s
t a
lp
h
ab
et
p
r
o
p
er
ar
e
n
'
t c
h
an
g
e,
th
at
is
d
u
e
to
th
e
f
ac
t th
a
t th
e
r
ec
u
r
r
en
ce
f
o
r
alp
h
ab
et
is
s
eld
o
m
u
tili
ze
d
in
I
n
d
o
n
esian
s
cr
ip
t.
T
h
e
e
x
p
er
ien
ce
r
esu
lts
in
o
b
tain
in
g
en
cr
y
p
tio
n
tex
t
w
h
ich
ca
n
b
e
r
ea
d
.
T
o
g
et
h
er
th
e
en
cr
y
tio
n
tex
t
wh
ich
ca
n
b
e
r
ea
d
,
th
at
in
cr
y
p
tan
aly
s
is
with
o
u
t
s
u
s
p
ec
t
at
le
tter
,
an
d
also
th
e
c
r
y
p
tan
aly
s
t
with
o
u
t
tr
y
at
s
o
lv
ed
th
e
en
cr
y
p
tio
n
tex
t [
1
0
]
.
I
n
2
0
1
7
,
A.
Sh
af
ali,
p
r
o
p
o
s
e
s
u
m
m
ar
y
th
e
v
ar
y
m
o
d
er
n
p
ict
u
r
e
cip
h
er
m
eth
o
d
s
wh
o
m
f
r
a
ctal
clef
i
s
u
ti
lized
f
o
r
ci
p
h
er
/d
ec
i
p
h
er
n
e
x
t
th
r
o
u
g
h
(
ex
ch
a
n
g
e,
m
ix
an
d
p
r
o
p
a
g
atio
n
)
m
eth
o
d
s
f
o
r
s
u
p
p
ly
p
o
wer
f
u
l
cip
h
er
s
y
s
tem
.
T
h
e
alg
o
r
ith
m
s
c
o
v
er
ed
b
o
th
s
p
ec
ial
k
e
y
ci
p
h
er
a
d
d
itio
n
g
e
n
er
al
clef
cip
h
er
m
eth
o
d
in
th
e
ar
ticle.
T
h
is
an
aly
s
es
alg
o
r
ith
m
c
o
n
tain
s
co
llectio
n
o
f
f
r
ac
tal
wo
r
k
to
Ma
n
d
elb
r
o
t
co
llectio
n
,
J
u
lia
co
llectio
n
,
Hilb
er
t
cu
r
v
e,
th
r
ee
d
im
en
s
io
n
s
'
f
r
ac
tal,
s
ev
er
al
-
f
r
ac
tal,
in
v
er
s
e
s
ec
u
r
e
f
o
r
ce
(
I
F
S
)
an
d
ch
ao
tic
wo
r
k
f
o
r
g
en
er
ate
d
co
m
p
lex
ity
clef
u
tili
ze
d
in
t
h
e
cip
h
er
o
p
er
atio
n
.
I
d
e
n
tical
ex
ec
u
tio
n
o
f
e
v
er
y
a
lg
o
r
ith
m
is
an
aly
ze
th
r
o
u
g
h
p
ea
k
s
ig
n
al
n
o
is
e
r
atio
(
PS
NR
)
ch
ec
k
,
clef
s
p
ac
e,
s
en
s
itiv
en
ess
an
aly
ze
s
,
m
ea
s
u
r
e
o
f
co
r
r
elatio
n
co
ef
f
icien
t
r
e
v
alu
es
am
o
n
g
th
e
n
eig
h
b
o
r
in
g
p
o
in
ts
o
f
to
g
eth
er
p
ictu
r
es
(
o
r
ig
in
p
ictu
r
e,
an
d
cip
h
er
e
d
p
ict
u
r
e)
,
th
at
o
f
f
er
s
im
p
o
r
tan
t r
e
f
in
em
e
n
t in
ex
ec
u
tio
n
th
r
o
u
g
h
th
e
cla
s
s
ic
en
cip
h
er
s
m
an
n
er
s
[
1
1
]
.
I
n
2
0
1
8
,
Z
.
Ab
d
u
l
Alif
,
et
al
.
,
p
r
o
p
o
s
e
a
n
ew
s
teg
an
o
g
r
a
p
h
y
t
ec
h
n
iq
u
e
with
d
at
u
m
ch
ar
te
d
d
elin
ea
tio
n
,
it
ca
n
b
e
d
ec
r
ea
s
in
g
th
e
n
u
m
e
r
al
o
f
b
it'
s
ad
ju
s
ted
ea
ch
p
o
in
t.
T
h
is
s
u
g
g
est
ed
tec
h
n
iq
u
e
,
f
o
u
r
m
y
s
ter
y
d
atu
m
b
its
ar
e
ch
ar
ted
to
g
eth
er
f
o
u
r
ex
tr
em
e
im
p
o
r
ta
n
t
b
its
in
to
a
co
v
er
t
p
o
i
n
t.
th
is
wo
r
k
o
n
ly
2
-
b
its
L
SB
s
at
a
p
o
in
t
is
ad
ju
s
ted
f
o
r
i
n
d
icate
s
to
ch
ar
ted
d
elin
ea
ti
o
n
.
T
ests
o
f
o
u
t
co
m
es
s
h
o
wn
th
at
s
u
g
g
ested
t
ec
h
n
iq
u
e
h
as
a
b
ilit
y
f
o
r
r
ea
lize
3
.
4
8
%
b
ig
g
e
r
em
b
ed
d
ed
ca
p
ac
ity
in
wh
ich
en
h
a
n
ce
m
en
t
th
e
v
is
ib
le
q
u
ality
(
s
u
ch
as
p
ea
k
s
ig
n
al
n
o
is
e
r
atio
(
PS
NR
)
is
3
.
7
3
d
B
)
an
d
d
ec
r
ea
s
e
th
e
m
o
d
if
y
o
f
0
.
7
6
b
its
ea
ch
p
o
in
t.
m
o
r
e
o
v
er
,
th
e
s
u
g
g
ested
tech
n
iq
u
e
s
u
p
p
ly
s
af
ety
s
id
e
v
er
s
u
s
ess
en
tial
r
eg
u
lar
an
d
s
in
g
u
lar
s
ets
(
R
S)
s
teg
an
alay
s
is
,
an
d
h
is
to
g
r
a
m
s
teg
an
alay
s
is
d
is
co
v
er
o
f
f
en
s
i
v
es [
1
2
]
.
I
n
2
0
1
8
,
J.
Kam
ald
ee
p
,
an
d
et
a
l.
,
p
r
o
p
o
s
e
a
tec
h
n
iq
u
e
o
f
p
ic
tu
r
e
co
d
i
n
g
is
co
n
ce
alin
g
th
e
d
ata
alo
n
g
a
s
elec
t
p
ix
el
an
d
o
n
th
e
f
o
llo
win
g
v
alu
e
o
f
th
e
ch
o
ices
p
o
in
t,
it
is
,
p
o
in
t
o
n
e.
T
h
e
o
n
e
-
b
i
t
h
as
co
n
ce
alin
g
f
o
r
ch
o
ices
p
o
in
t,
an
d
an
o
th
e
r
b
it
is
s
ec
o
n
d
-
b
it
co
n
ce
alin
g
o
n
th
e
p
o
in
t
o
n
e
v
al
u
e.
O
n
th
e
f
o
u
n
d
atio
n
o
f
s
ev
en
b
it
o
f
th
e
p
o
in
ts
o
f
p
ictu
r
e,
a
m
a
th
em
atica
l
wo
r
k
is
ap
p
ly
i
n
g
i
n
s
ev
en
-
b
it
at
p
o
in
ts
,
wh
en
g
en
er
ate
an
in
ter
im
v
ar
iab
le
(
p
o
in
t
o
n
e)
.
T
h
e
s
ev
e
n
-
b
it
f
o
r
ch
o
ice
p
ix
el
an
d
s
ev
e
n
-
b
it
o
f
p
o
in
t o
n
e
a
r
e
u
tili
ze
d
to
d
ata
co
n
ce
al
an
d
e
x
tr
ac
t.
On
th
e
f
o
u
n
d
atio
n
at
a
co
n
ju
n
ctio
n
at
th
e
two
v
alu
es,
two
b
its
in
th
e
le
tter
ca
n
b
e
co
n
ce
alin
g
in
to
ev
er
y
p
o
in
t.
T
h
e
o
u
tc
o
m
e
in
t
h
is
s
u
g
g
ested
th
e
e
f
f
icien
cy
in
th
e
tech
n
iq
u
e,
an
d
it
is
test
f
o
r
th
e
f
o
u
n
d
atio
n
o
f
p
ar
am
eter
s
s
u
ch
as
PS
NR
an
d
MSE
,
an
d
th
e
c
o
m
p
ar
e
d
to
g
e
th
er
with
s
o
m
e
f
o
r
m
er
ly
s
u
g
g
ested
m
eth
o
d
s
was
d
o
n
e.
T
h
e
s
u
g
g
ested
p
ict
u
r
e
co
n
ce
al
d
ata
s
h
o
wn
is
in
ter
esti
n
g
,
h
o
p
ef
u
l
o
u
tc
o
m
es
wh
ich
co
m
p
ar
is
o
n
f
o
r
an
o
th
er
ex
is
tin
g
m
eth
o
d
[
1
3
].
I
n
2
0
1
9
,
A
.
Fatm
a,
an
d
et
a
l.
,
p
r
o
p
o
s
e
a
m
eth
o
d
ical
p
r
o
p
r
i
et
y
s
u
r
v
e
y
is
co
n
d
u
ct
o
f
f
o
llo
win
g
th
at
d
ev
elo
p
e
d
in
I
o
T
s
ar
ch
itectu
r
e
wh
ich
it'
s
th
e
f
ir
s
t
d
e
v
elo
p
e
d
f
r
o
m
2
0
0
8
to
2
0
1
8
.
T
h
e
co
n
tr
ast
b
etwe
en
th
a
t
ar
ch
itectu
r
es a
r
e
f
o
u
n
d
atio
n
te
r
m
o
f
th
e
ar
ch
itectu
r
al
h
ea
p
,
c
o
v
er
t
p
r
o
b
lem
s
,
th
e
tech
n
o
l
o
g
i
es u
s
es a
n
d
s
ig
h
t
a
t
s
af
ety
an
d
co
n
f
id
en
tiality
s
id
e.
T
h
e
o
u
tco
m
e
o
f
s
u
r
v
e
y
s
h
o
w
n
th
e
f
ir
s
t
I
o
T
ar
ch
itectu
r
es
d
o
esn
'
t
o
f
f
er
s
o
v
e
r
all
s
ig
n
if
ican
ce
to
I
o
T
th
at
d
ep
ict
its
n
atu
r
e,
wh
ile
th
e
m
o
d
er
n
I
o
T
ar
ch
itectu
r
es
tr
an
s
f
er
o
v
e
r
all
s
ig
n
if
ican
ce
o
f
I
o
T
,
s
tar
tin
g
f
r
o
m
d
atu
m
s
et,
f
o
llo
win
g
th
r
o
u
g
h
d
atu
m
t
r
an
s
m
itted
an
d
tr
ea
tm
en
t,
an
d
f
i
n
is
h
in
g
with
d
atu
m
d
is
s
em
in
atio
n
.
f
u
r
th
er
m
o
r
e,
t
h
e
o
u
tco
m
e
d
etec
ted
th
at
I
o
T
s
ar
ch
itectu
r
es
ar
e
d
ev
elo
p
p
r
o
g
r
ess
iv
ely
in
th
e
last
y
ea
r
s
,
d
u
r
in
g
im
p
r
o
v
e
ar
ch
ite
ctu
r
e
h
ea
p
in
n
ew
s
o
lu
tio
n
s
f
o
r
r
eliev
e
I
o
T
s
d
ef
ies
s
o
as
s
ca
l
ab
le,
in
ter
o
p
er
ab
le,
ex
ten
s
ib
le,
an
d
m
a
n
ag
em
e
n
t.
with
r
ed
u
ctio
n
s
ig
h
t o
f
s
af
ety
s
o
lu
tio
n
s
[1
4
].
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
18
,
No
.
6
,
Dec
em
b
e
r
2
0
2
0
:
2
9
2
8
-
2
9
3
8
2930
I
n
2
0
1
9
,
D
.
L
.
M
i
n
h
,
e
t
a
l.
,
p
r
o
p
o
s
e
d
t
h
e
e
v
o
l
v
e
o
f
I
o
T
s
a
n
d
c
l
o
u
d
c
o
m
p
u
t
e
i
s
b
e
n
e
f
i
c
e
n
t
p
a
t
i
e
n
t
i
n
t
e
g
r
i
t
y
,
p
e
r
s
o
n
n
e
l
c
o
n
t
e
n
t
m
e
n
t
,
t
h
e
o
p
e
r
a
t
i
o
n
i
s
e
f
f
i
c
i
e
n
c
y
i
n
t
h
e
m
e
d
i
c
a
l
m
a
n
u
f
a
c
t
u
r
e
.
T
h
a
t
s
c
a
n
n
i
n
g
h
a
s
b
e
h
a
v
e
d
t
o
a
n
a
l
y
s
e
t
h
e
m
o
d
e
r
n
I
o
T
s
s
y
n
t
h
e
s
i
s
,
a
p
p
l
i
c
a
t
i
o
n
s
,
m
a
r
k
e
t
d
i
r
e
c
t
i
o
n
o
f
I
o
T
s
i
n
h
e
a
l
t
h
c
a
r
e
,
a
d
d
i
t
i
o
n
s
u
r
v
e
y
t
r
e
n
d
e
v
o
l
v
e
i
n
I
o
T
s
o
f
c
l
o
u
d
c
o
m
p
u
t
e
-
e
s
t
a
b
l
i
s
h
e
d
h
e
a
l
t
h
c
a
r
e
a
p
p
l
i
c
a
t
i
o
n
s
f
r
o
m
2
0
1
5
.
I
t
c
a
n
a
s
w
e
l
l
l
o
o
k
w
h
i
c
h
h
o
p
e
f
u
l
t
e
c
h
n
o
l
o
g
y
l
i
k
e
c
l
o
u
d
c
o
m
p
u
t
e
,
a
m
b
i
e
n
t
h
e
l
p
l
i
v
i
n
g
,
l
a
r
g
e
d
a
t
u
m
,
a
n
d
w
e
a
r
a
b
l
e
a
r
e
e
x
i
s
t
e
n
c
e
a
p
p
l
y
i
n
g
i
n
t
h
e
h
e
a
l
t
h
c
a
r
e
m
a
n
u
f
a
c
t
u
r
e
a
n
d
d
e
t
e
c
t
d
i
f
f
e
r
e
n
t
I
o
T
s
,
e
-
h
e
a
l
t
h
o
r
g
a
n
i
z
a
t
i
o
n
a
n
d
p
o
l
i
c
y
w
o
r
l
d
w
i
d
e
t
o
l
i
m
i
t
,
t
h
e
y
a
r
e
h
e
l
p
t
h
e
p
o
t
e
n
t
i
a
l
e
v
o
l
v
e
a
t
I
o
T
s
a
n
d
c
l
o
u
d
c
o
m
p
u
t
e
i
n
t
h
e
h
e
a
l
t
h
c
a
r
e
m
a
n
u
f
a
c
t
u
r
e
[
1
5
]
.
2.
ST
E
G
ANO
G
RAP
H
Y
Steg
an
o
g
r
ap
h
y
is
th
e
tech
n
iq
u
e
o
f
co
n
ce
al
a
s
ec
r
et
letter
in
p
u
b
lic
o
r
a
n
o
r
d
in
ar
y
m
ess
ag
e
an
d
th
e
ex
tr
ac
tio
n
o
f
th
at
s
ec
r
et
letter
at
its
d
esti
n
atio
n
.
"Cry
p
to
g
r
ap
h
y
an
d
s
teg
an
o
g
r
ap
h
y
ar
e
clo
s
ely
r
elate
d
to
ea
ch
o
th
er
"
.
S
teg
an
o
g
r
a
p
h
y
is
th
e
tech
n
iq
u
e
o
f
c
o
n
ce
al
th
e
letter
s
th
at
it
ca
n
n
o
t
s
aw
b
y
attac
k
er
s
.
C
ip
h
er
in
g
ch
an
g
es,
a
letter
,
wh
ile
th
at
i
t
ca
n
n
o
t
b
e
lo
o
k
e
d
u
n
d
e
r
s
to
o
d
[
1
6
,
1
7
]
.
A
co
n
f
i
d
en
tial
letter
in
th
e
f
o
r
m
o
f
en
cr
y
p
tio
n
tex
t
m
ig
h
t
ar
o
u
s
e
s
u
s
p
icio
n
wh
er
ea
s
a
letter
wh
ich
is
u
n
s
ee
n
o
r
h
id
d
e
n
cr
ea
t
ed
th
r
o
u
g
h
u
tili
ze
d
s
ten
o
g
r
ap
h
ic
tech
n
iq
u
es
will
n
o
t.
Steg
an
o
g
r
a
p
h
y
is
esp
ec
ially
u
tili
ze
d
o
n
co
m
p
u
ter
s
with
d
ig
ital
d
atu
m
b
ein
g
th
e
ca
r
r
ier
s
a
n
d
n
etwo
r
k
s
b
ei
n
g
th
e
v
er
y
f
ast
tr
an
s
m
is
s
io
n
ch
an
n
els.
Var
io
u
s
ca
r
r
ier
f
o
l
d
er
f
o
r
m
ats
(
s
cr
ip
t,
p
ictu
r
es,
an
d
s
o
u
n
d
/v
i
d
eo
)
ca
n
b
e
u
tili
ze
d
in
o
r
d
er
th
at
in
f
o
r
m
atio
n
h
id
in
g
ex
ec
u
ted
[
1
8
].
T
h
r
o
u
g
h
en
cr
y
p
tio
n
an
d
co
n
ce
alm
en
t
ar
e
u
tili
ze
d
f
o
r
s
ec
u
r
ed
co
n
n
ec
tio
n
b
u
t
th
ey
ar
e
v
ar
io
u
s
in
n
atu
r
e.
As
e
n
cr
y
p
tio
n
r
ep
air
s
a
letter
is
n
o
t
u
n
d
er
s
to
o
d
,
wh
ile
th
e
s
teg
an
o
g
r
ap
h
y
is
co
n
ce
alin
g
th
e
letter
th
at
it'
s
n
o
t
s
aw
b
y
attac
k
er
s
.
T
h
e
g
o
a
l
o
f
s
teg
an
o
g
r
ap
h
y
is
to
e
m
b
e
d
d
ed
th
e
co
n
n
ec
tio
n
co
n
ten
ts
in
an
y
co
v
e
r
m
ed
ia.
As
th
e
o
u
tco
m
e,
h
id
e
c
o
n
f
id
en
tial
letter
.
An
d
d
ig
ital
s
teg
an
o
g
r
a
p
h
y
is
th
e
s
cien
ce
o
f
tr
an
s
f
er
d
ata
with
co
n
f
id
en
tial
l
etter
em
b
ed
d
e
d
i
n
it.
T
h
er
ef
o
r
e,
s
teg
an
o
g
r
ap
h
y
is
a
f
o
r
m
o
f
s
af
ety
tech
n
iq
u
e
wh
er
e
th
e
ex
is
ten
ce
o
f
a
letter
is
k
ep
t c
o
n
ce
al
b
etw
ee
n
th
e
tr
an
s
m
itter
an
d
th
e
in
t
en
d
ed
r
ec
i
p
ien
t [
1
9]
.
3.
I
NT
E
RN
E
T
O
F
T
H
I
NG
S
T
h
er
e
ar
e
n
u
m
b
er
o
f
d
e
f
in
itio
n
s
o
f
th
e
in
ter
n
et
o
f
th
in
g
s
(I
o
T
)
th
at
ar
is
e
n
o
wa
d
ay
s
.
T
h
e
f
i
r
s
t
d
ef
in
itio
n
:
is
ac
tu
ally
s
u
p
p
ly
th
r
o
u
g
h
th
e
U.
S.
Natio
n
al
I
n
tellig
en
ce
C
o
u
n
cil.
T
h
e
I
o
T
s
is
p
u
b
lic
n
o
tio
n
o
f
th
i
n
g
s
,
m
o
s
tly
d
aily
g
o
als,
th
ese
ar
e
r
ea
d
in
g
,
r
ec
o
g
n
itio
n
,
lo
ca
tio
n
s
,
a
d
d
r
ess
es,
an
d
co
n
tr
o
ller
s
b
y
th
e
I
n
ter
n
et,
to
g
eth
e
r
th
r
o
u
g
h
r
ad
io
f
r
eq
u
en
cy
id
e
n
tific
atio
n
(
R
FID
)
,
lo
ca
l
ar
ea
n
etwo
r
k
(
L
AN
)
,
wid
e
ar
ea
n
etwo
r
k
(
W
AN
)
,
o
r
an
o
th
er
m
ea
n
s
with
o
u
t
ca
b
le
s
[
2
0
]
.
T
h
e
in
ter
n
et
o
f
th
in
g
s
g
iv
en
s
r
eso
lu
tio
n
d
ep
e
n
d
s
o
n
in
teg
r
ate
o
f
d
ata
tech
n
o
lo
g
ies,
wh
ile
in
d
icate
t
o
d
ev
ice
an
d
p
r
o
g
r
am
u
tili
ze
d
in
s
av
in
g
,
r
ec
o
v
er
,
an
d
tr
e
atm
en
t
d
atu
m
an
d
telec
o
m
m
u
n
icatio
n
s
tech
n
o
lo
g
ies
wh
ich
co
n
tain
elec
tr
o
n
ic
s
y
s
tem
u
tili
ze
d
f
o
r
co
n
n
ec
tio
n
am
o
n
g
p
er
s
o
n
s
o
r
s
ets
[
2
1
,
2
2
]
.
T
h
e
f
ast
a
p
p
r
o
x
i
m
ate
o
f
d
ata
an
d
telec
o
m
m
u
n
i
ca
tio
n
s
tech
n
o
lo
g
ies
is
s
tr
u
ctu
r
e
o
n
3
s
tr
atu
m
s
o
f
tech
n
o
lo
g
ies
in
v
e
n
tio
n
:
th
e
c
lo
u
d
,
in
f
o
r
m
atio
n
an
d
telec
o
m
m
u
n
icatio
n
tu
b
e/n
ets
an
d
e
q
u
ip
m
en
t
[
2
3
]
.
As
o
u
tco
m
e
o
f
th
is
ap
p
r
o
x
im
ate
,
th
e
I
o
T
s
ap
p
licatio
n
s
d
em
a
n
d
th
e
ad
ap
tab
i
lity
o
f
class
ical
in
d
u
s
tr
ies
an
d
th
e
tech
n
o
lo
g
ies will su
p
p
ly
c
h
an
ce
s
f
o
r
m
o
d
er
n
in
d
u
s
tr
y
to
s
tan
d
o
u
t a
n
d
f
o
r
tr
an
s
f
er
m
o
d
er
n
u
s
er
'
s
ex
p
er
tis
e
an
d
s
er
v
ices [
2
4
]
.
4.
E
VA
L
UA
T
I
O
N
SY
ST
E
M
P
ARF
O
RM
AN
CE
T
h
e
s
y
s
t
e
m
i
s
e
v
a
l
u
a
t
e
d
b
y
a
p
p
l
y
i
n
g
t
h
e
s
e
t
o
f
m
e
a
s
u
r
e
m
e
n
t
s
s
u
c
h
a
s
m
e
a
n
s
q
u
a
r
e
e
r
r
o
r
(
M
S
E
)
,
p
e
a
k
s
i
g
n
a
l
n
o
i
s
e
r
a
t
i
o
(
P
S
N
R
)
,
c
o
r
r
e
l
a
t
i
o
n
co
ef
f
icien
t
,
h
i
s
t
o
g
r
a
m
,
a
n
d
i
n
f
o
r
m
a
t
i
o
n
e
n
t
r
o
p
y
[
2
5
-
27
]
.
T
h
e
s
e
m
e
a
s
u
r
e
m
e
n
t
s
a
r
e
r
e
q
u
i
r
e
d
f
o
r
e
v
a
l
u
a
t
i
o
n
a
n
y
n
e
w
a
l
g
o
r
i
t
h
m
s
.
T
h
e
n
e
w
a
l
g
o
r
i
t
m
t
h
a
t
i
s
e
x
c
e
e
d
i
n
g
t
h
e
s
e
m
e
a
s
u
r
e
m
e
n
t
s
c
a
n
b
e
c
o
n
s
i
d
e
r
e
d
i
s
a
g
o
o
d
a
l
g
o
r
i
t
m
.
4
.
1
.
M
ea
n
s
qu
a
re
e
rr
o
r
M
S
E
i
s
c
a
l
c
u
l
a
t
e
d
b
y
c
o
m
p
a
r
i
n
g
t
h
e
b
y
t
e
s
o
f
t
w
o
i
m
a
g
e
s
.
A
p
i
x
e
l
c
o
m
p
r
i
s
e
s
8
b
i
t
s
,
a
n
d
t
h
u
s
,
2
5
6
l
e
v
e
l
s
a
r
e
a
v
a
i
l
a
b
l
e
t
o
r
e
p
r
e
s
e
n
t
v
a
r
i
o
u
s
g
r
e
y
l
e
v
e
l
s
.
M
S
E
s
a
r
e
v
a
l
u
a
b
l
e
w
h
e
n
t
h
e
b
y
t
e
s
o
f
a
n
i
m
a
g
e
a
r
e
c
o
m
p
a
r
e
d
w
i
t
h
t
h
e
c
o
r
r
e
s
p
o
n
d
i
n
g
b
y
t
e
s
o
f
a
n
o
t
h
e
r
i
m
a
g
e
.
I
n
(
1
)
is
u
s
ed
to
co
m
p
u
te
M
SE
as f
o
llo
win
g
;
MS
E
=
∑
[
1
(
×
)
−
2
(
×
)
]
×
×
(
1
)
4
.
2
.
P
e
a
k
s
ig
na
l t
o
no
is
e
r
a
t
i
o
n
P
S
N
R
i
s
a
p
a
r
a
m
e
t
e
r
u
s
e
d
t
o
m
e
a
s
u
r
e
t
h
e
a
m
o
u
n
t
o
f
i
m
p
e
r
c
e
p
t
i
b
i
l
i
t
y
i
n
d
e
c
i
b
e
l
s
.
I
t
m
e
a
s
u
r
e
s
t
h
e
q
u
a
l
i
t
y
b
e
t
w
e
e
n
t
h
e
t
w
o
i
m
a
g
e
s
.
A
l
a
r
g
e
P
S
N
R
v
a
l
u
e
i
n
d
i
c
a
t
e
s
t
h
a
t
a
s
m
a
l
l
d
i
f
f
e
r
e
n
c
e
e
x
i
s
t
s
b
e
t
w
e
e
n
t
w
o
i
m
a
g
e
s
.
B
y
c
o
n
t
r
a
s
t
,
a
s
m
a
l
l
P
S
N
R
v
a
l
u
e
i
n
d
i
c
a
t
e
s
a
h
u
g
e
d
i
s
t
o
r
t
i
o
n
b
e
t
w
e
e
n
t
w
o
i
m
a
g
e
s
.
I
n
(
2
)
is
u
s
ed
to
co
m
p
u
te
PS
NR
a
s
f
o
llo
win
g
;
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Du
a
l m
eth
o
d
cryp
to
g
r
a
p
h
y
im
a
g
e
b
y
tw
o
fo
r
ce
s
ec
u
r
e
a
n
d
…
(
Ma
is
a
'a
A
b
id
A
li K
.
A
l
-
Da
b
b
a
s
)
2931
P
S
N
R
= 1
-
Lo
g
10
R
2
(
2
)
MS
E
4
.
3
.
Co
rr
el
a
t
io
n
c
o
e
f
f
icient
T
h
e
m
e
a
s
u
r
e
m
e
n
t
o
f
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
r
i
s
c
o
m
p
u
t
e
t
o
t
h
e
r
a
n
g
e
a
n
d
t
r
e
n
d
o
f
t
h
e
l
i
n
e
a
r
s
e
t
o
f
t
w
o
r
a
n
d
o
m
i
z
e
v
a
r
i
a
b
l
e
s
.
I
f
t
w
o
v
a
r
i
a
b
l
e
s
a
r
e
n
e
a
r
r
e
g
a
r
d
i
n
g
,
t
h
e
v
a
l
u
e
o
f
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
i
s
n
e
a
r
t
o
v
a
l
u
e
o
f
1
.
I
f
t
h
e
v
a
l
u
e
c
o
e
f
f
i
c
i
e
n
t
i
s
n
e
a
r
t
o
0
,
t
w
o
v
a
r
i
a
b
l
e
s
a
r
e
n
o
t
r
e
g
a
r
d
i
n
g
.
T
h
e
v
a
l
u
e
o
f
c
o
e
f
f
i
c
i
e
n
t
r
c
a
n
b
e
c
a
l
c
u
l
a
t
e
d
u
s
i
n
g
t
h
e
n
e
x
t
(
3
)
[
28
].
r
=
∑
(
−
)
(
−
)
∑
√
∑
(
−
)
2
√
∑
(
−
)
2
,
(
3
)
4
.
4
.
H
is
t
o
g
ra
m
T
h
e
ca
lcu
late
h
is
to
g
r
am
o
f
a
n
im
ag
e
is
a
d
iag
r
a
m
to
d
is
p
lay
wh
ich
n
u
m
er
o
u
s
p
ix
els
a
r
e
in
e
v
er
y
m
ea
s
u
r
e
o
f
d
eg
r
ee
o
r
ev
er
y
in
d
icato
r
u
p
o
n
th
e
in
d
ex
ed
co
lo
r
im
ag
e.
T
h
e
h
is
to
g
r
am
in
cl
u
d
e
d
ata
n
ec
ess
ar
y
t
o
im
ag
e
n
o
r
m
aliza
tio
n
wh
en
im
ag
e
p
ix
els
ar
e
len
g
th
y
,
to
g
iv
e
n
a
s
en
s
ib
le
d
is
s
im
ilar
ity
[
2
0
]
.
I
n
th
is
h
is
to
g
r
am
,
th
e
n
o
r
m
aliza
tio
n
m
eth
o
d
it c
a
n
b
e
ev
o
lv
in
g
.
No
r
m
aliza
tio
n
p
r
o
lo
n
g
ed
th
e
m
ea
s
u
r
e
d
o
m
ai
n
o
f
th
e
p
ix
el
lev
els
to
th
e
f
u
ll
m
ea
s
u
r
e
to
b
etter
th
e
d
is
s
im
ilar
ity
o
f
im
ag
e.
T
o
u
s
in
g
th
is
m
eth
o
d
,
t
h
e
eq
u
alize
o
f
a
n
ew
p
ix
el
v
al
u
e
is
r
ed
ef
in
ed
b
y
in
(
4
)
[
29
].
(
,
)
=
ℎ
≤
(
,
)
(
)
(
4
)
4
.
5
.
I
nfo
r
m
a
t
io
n
ent
r
o
py
I
n
f
o
r
m
a
t
i
o
n
e
n
t
r
o
p
y
(
IE
)
i
s
a
n
e
s
s
e
n
t
i
a
l
r
a
n
d
o
m
n
e
s
s
f
e
a
t
u
r
e
t
h
a
t
i
s
a
p
p
l
i
e
d
t
o
v
a
r
i
o
u
s
f
i
e
l
d
s
,
s
u
c
h
a
s
l
o
s
s
l
e
s
s
d
a
t
a
c
o
m
p
r
e
s
s
i
o
n
,
s
t
a
t
i
s
t
i
c
a
l
i
n
f
e
r
e
n
c
e
,
m
a
c
h
i
n
e
l
e
a
r
n
i
n
g
,
a
n
d
c
r
y
p
t
o
g
r
a
p
h
y
.
T
h
i
s
c
r
i
t
e
r
i
o
n
c
a
n
m
e
a
s
u
r
e
t
h
e
d
i
s
t
r
i
b
u
t
i
o
n
o
f
g
r
a
y
v
a
l
u
e
s
i
n
a
n
im
a
g
e
.
W
h
e
n
I
E
i
s
h
i
g
h
,
t
h
e
d
i
s
t
r
i
b
u
t
i
o
n
o
f
g
r
a
y
v
a
l
u
e
s
i
s
u
n
i
f
o
r
m
.
T
h
e
s
e
c
u
r
i
t
y
o
f
a
s
t
e
g
a
n
o
g
r
a
p
h
i
c
s
y
s
t
e
m
i
s
m
e
a
s
u
r
e
d
i
n
t
e
r
m
s
o
f
I
E
.
L
e
t
e
1
,
e
2
,...,
e
m
b
e
m
p
o
s
s
i
b
l
e
e
l
e
m
e
n
t
s
w
i
t
h
p
r
o
b
a
b
i
l
i
t
i
e
s
P
(
e
1
)
,
P
(
e
2
)
,
.
.
.
,
P
(
e
m
)
.
T
h
e
e
n
t
r
o
p
y
i
s
g
i
v
e
n
a
s
;
H
(
e
)
=
−
∑
P
(
e
i
)
l
og
2
P
(
e
i
)
m
−
1
i
=
0
(
5
)
T
h
is
eq
u
atio
n
y
ield
s
an
ass
ess
m
en
t o
f
t
h
e
d
o
m
ain
m
i
n
im
u
m
n
u
m
er
al
o
f
b
its
th
at
is
n
ee
d
ed
to
cip
h
er
a
ch
ain
o
f
b
its
o
n
th
e
b
asis
o
f
f
r
eq
u
e
n
cy
o
f
s
y
m
b
o
l
[
3
0
,
3
1
]
.
5.
P
RO
P
O
SE
D
SYS
T
E
M
T
h
e
f
l
o
w
c
h
a
r
t
i
n
d
i
c
a
t
e
s
f
o
r
p
r
o
p
o
s
e
d
s
y
s
t
e
m
t
o
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
a
n
d
c
o
n
c
e
a
l
s
e
c
r
e
t
m
e
s
s
a
g
e
i
n
I
o
T
i
n
l
a
y
e
r
o
f
d
a
t
a
b
a
s
e
,
a
s
s
h
o
w
n
i
n
F
i
g
u
r
e
1
a
n
d
F
i
g
u
r
e
2
.
T
o
e
x
p
l
a
i
n
e
m
b
e
d
d
e
d
a
n
d
e
x
t
r
a
c
t
i
o
n
a
l
g
o
r
i
t
h
m
s
.
I
n
t
h
i
s
p
r
o
p
o
s
e
d
s
y
s
t
e
m
c
o
n
s
i
s
t
s
o
f
t
w
o
s
e
c
u
r
e
f
o
r
c
e
m
e
t
h
o
d
(
2
F
S
)
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
,
s
e
c
r
e
t
m
e
s
s
a
g
e
,
s
e
c
r
e
t
k
e
y
(
c
o
s
i
n
e
c
u
r
v
e
)
,
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
,
a
n
d
I
o
T
:
I
n
t
h
e
s
t
a
r
t
i
s
l
o
a
d
c
o
l
o
r
i
m
a
g
e
o
f
s
i
z
e
2
2
5
×
2
2
5
,
a
n
d
a
p
p
l
i
e
d
2
F
S
i
n
f
i
v
e
k
e
y
s
(
K
1
,
K
2
,
K
3
,
K
4
,
a
n
d
K
5
)
f
o
r
c
i
p
h
e
r
i
m
a
g
e
t
o
o
b
t
a
i
n
e
d
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
.
A
s
s
h
o
w
i
n
a
l
g
o
r
i
t
h
m
1
.
E
n
cr
y
p
tio
n
2
FS
Alg
o
r
ith
m
1
:
Process
Input: original color image, 2FS
Output: encryption image
Initial
A= original image
B= FS, K1, K2, K3, K4, K5
C= Execute 2FS
D= Encryption image
Step1: Loading original image in A.
Step 2: Order
matrix 64 bit divide in set of blocks in 16 bits in B.
a.
First round
step no 1
1
-
Performance xnor process in first 16 bits together K1.
2
-
Used function and exchange on 16 bits.
3
-
Performance xnor
process in final 16 bits together K1.
4
-
Used function and exchange on 16 bits.
Step no 2
5
-
Exchange blocks.
b.
Second round
Repeat first round in step no 1 and step no2 with K2.
c.
Third round
Repeat first round in step no 1 and step no2 with K3.
d.
Fourth round
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
18
,
No
.
6
,
Dec
em
b
e
r
2
0
2
0
:
2
9
2
8
-
2
9
3
8
2932
Repeat first round in step no 1 and step no2 with K4.
e.
Fifth round
Repeat first round in step no 1 and step no2 with K5.
Encryption image FS
Step 3: Repeat steps from
a.
to
e.
for obtained 2FS.
Step 4: Encryption image 2FS
in C.
step 5: Put (the result encryption image) in D.
End
Fig
u
r
e
1
.
T
h
e
em
b
e
d
d
ed
alg
o
r
ith
m
,
f
o
r
th
e
s
tep
s
o
f
em
b
ed
d
e
d
s
ec
r
et
m
ess
ag
e
Fig
u
r
e
2.
T
h
e
ex
tr
ac
tio
n
alg
o
r
ith
m
,
f
o
r
th
e
s
tep
s
o
f
ex
tr
ac
tio
n
s
ec
r
et
m
ess
ag
e
F
i
g
u
r
e
3
e
x
p
l
a
i
n
t
h
e
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
i
n
FS
a
n
d
2
FS
(
t
w
o
f
o
r
ce
s
e
c
u
r
e
)
.
A
f
t
e
r
e
n
c
r
y
p
t
i
o
n
i
m
ag
e
i
s
i
n
p
u
t
t
h
e
s
ec
r
e
t
m
ess
a
g
e
f
r
o
m
s
e
n
s
o
r
,
a
n
d
c
o
n
v
e
r
t
e
d
e
a
c
h
c
h
a
r
a
c
t
er
f
r
o
m
s
e
c
r
et
m
es
s
a
g
e
t
o
b
i
n
a
r
y
c
o
d
e
i
n
A
m
e
r
i
c
an
S
t
a
n
d
a
r
d
C
o
d
e
f
o
r
I
n
f
o
r
m
a
ti
o
n
I
n
t
e
r
c
h
a
n
g
e
(
A
SC
I
I
)
.
T
h
i
s
s
e
q
u
e
n
c
e
o
f
b
i
n
a
r
y
b
i
t
s
e
c
r
et
m
ess
a
g
e
t
o
h
i
d
e
i
n
t
o
c
o
v
e
r
(
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
)
i
n
l
e
as
t
s
i
g
n
i
f
i
c
a
n
t
(
B
i
t
L
SB
)
i
n
r
e
d
,
g
r
e
e
n
,
b
l
u
e
(
R
GB
)
,
e
a
c
h
3
-
b
it
f
r
o
m
s
e
c
r
e
t
m
e
s
s
a
g
e
h
i
d
e
i
n
o
n
e
p
i
x
e
l
R
GB
i
n
t
o
c
o
v
e
r
,
t
h
i
s
o
p
e
r
a
t
i
o
n
is
XO
R
b
et
w
e
e
n
co
v
e
r
(
t
h
e
s
i
z
e
o
f
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
i
s
2
2
5
×
2
2
5
)
a
n
d
s
e
c
r
e
t
m
es
s
a
g
e
w
i
ll
b
e
u
s
e
d
t
h
e
s
e
c
r
e
t
k
e
y
is
a
c
u
r
v
e
o
f
c
o
s
i
n
e
,
[
a
=
1
0
;
t
=
0
:
0
.
0
1
:
1
0
;
A
=
a
*
c
o
s
(
t
)
;
p
l
o
t
(
t
,
A
)
;
]
.
F
i
g
u
r
e
4
i
n
d
i
c
a
te
s
f
o
r
d
e
c
r
e
t
k
ey
f
o
r
t
h
e
c
o
s
i
n
e
c
u
r
v
e
t
o
o
b
t
a
i
n
e
d
t
h
e
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
.
Fig
u
r
e
5
ex
p
lain
th
e
em
b
e
d
d
e
d
o
p
er
atio
n
to
co
n
ce
al
a
s
ec
r
et
m
ess
ag
e
is
4
4
ch
ar
ac
ter
o
r
3
5
2
b
its
in
s
ize
o
f
im
ag
e
(
2
5
5
×
2
5
5
)
o
r
6
5
0
2
5
p
ix
el,
th
e
ca
p
ac
ity
o
f
h
i
d
e
r
ate
n
o
.
o
f
b
its
m
ess
ag
e/n
o
o
f
p
ix
el
in
im
ag
e
is
in
ter
n
et
o
f
th
in
g
s
eq
u
al
0
.
0
0
5
4
1
.
Af
ter
h
id
e
s
ec
r
et
m
ass
ag
e
is
tr
an
s
m
is
s
io
n
th
e
s
teg
o
-
en
cr
y
p
tio
n
im
ag
e
f
o
r
I
o
T
s
an
d
s
av
ed
s
teg
o
-
en
c
r
y
p
tio
n
im
ag
e
in
s
er
v
er
s
to
r
ag
e
in
d
ata
b
ase
in
I
o
T
s
.
W
h
en
an
y
s
en
s
o
r
s
au
th
o
r
ized
,
n
ee
d
s
th
e
s
ec
r
et
m
ess
ag
e
ca
n
r
etr
iev
e
f
o
r
m
s
er
v
e
r
I
o
T
s
an
d
it
h
as
u
s
es
a
s
ec
r
et
k
ey
(
co
s
in
e
cu
r
v
e)
to
r
etr
iev
e
s
ec
r
et
m
ess
ag
e
an
d
r
ea
d
,
it
u
s
es
ex
tr
ac
tio
n
alg
o
r
ith
m
.
T
h
is
m
ess
ag
e
ca
n
b
e
h
id
e
te
x
t
o
r
im
a
g
e
o
r
au
d
io
in
th
is
p
a
p
er
will b
e
s
av
e
tex
ts
in
I
o
T
s
in
s
e
r
v
er
in
d
atab
ase,
as sh
o
wn
in
Fig
u
r
e
6
.
Fig
u
r
e
3.
E
n
cr
y
p
tio
n
im
ag
e
in
2
FS
Fig
u
r
e
4.
s
ec
r
et
k
e
y
f
o
r
th
e
c
o
s
in
e
cu
r
v
e
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Du
a
l m
eth
o
d
cryp
to
g
r
a
p
h
y
im
a
g
e
b
y
tw
o
fo
r
ce
s
ec
u
r
e
a
n
d
…
(
Ma
is
a
'a
A
b
id
A
li K
.
A
l
-
Da
b
b
a
s
)
2933
Fig
u
r
e
5.
Steg
o
-
en
cr
y
p
tio
n
im
a
ge
f
o
r
h
id
e
4
4
ch
a
r
ac
ter
in
im
ag
e
Fig
u
r
e
6.
S
av
e
s
teg
o
-
en
cr
y
p
tio
n
im
ag
e
in
I
o
T
s
in
s
er
v
e
r
in
d
a
tab
ase
E
m
b
ed
d
e
d
Alg
o
r
ith
m
2
:
Process:
Input:
Cover encryption image 2FS, Secret message, Secret key, Sensor.
Output: Stego
-
encryption image.
Initial
A= Load cover encryption image 2Fs. // 2FS in algorithm 1//
B= Load secret message.
C= Binary secret message
D= Load cosine secret key.
E= Load XOR o
peration to hide secret message.
F= Stego
-
encryption image.
G= Save stego in server.
Step 1: Loading cover encryption image in A.
Step 2: Loading secret message in B.
Step 3: Converted secret message each character to 8
-
bit binary using ASCII in C.
St
ep
4
:
Fi
nd
lo
ca
ti
on
s
in
to
en
cr
yp
ti
on
im
ag
e
fo
r
s
el
ec
t
fr
om
co
si
ne
se
cr
et
ke
y
fo
r
hi
de
ea
ch
3bit in
one location (one pixel) in LSB from RGB by uses XOR operation in E.
Step 5: Put the Result Stego
-
encryption image in F.
Step 6: Send the stego
-
objec
t in server and save in database in G.
End
E
x
tr
ac
tio
n
Alg
o
r
ith
m
3:
Process:
Input: Stego
-
encryption image, Secret key, Stego
-
object, Sensor authorize.
Output: Extraction secret message from server in database.
Initial
A= Retrieve stego
-
object by sensor authorize.
B= Load stego
-
encryption image.
C= Load cosine secret key
D= Binary secret message.
E= Set character of secret message.
F= Secret Message.
G= Object IoTs.
Step 1: Retrieve stego
-
object from database in server b
y sensor authorize in A.
Step 2: Load stego
-
encryption image in B.
Step 3: Load cosine secret key in C.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
18
,
No
.
6
,
Dec
em
b
e
r
2
0
2
0
:
2
9
2
8
-
2
9
3
8
2934
Step 3: Find binary secret message bit from image by using secret key to select locations
existent into hide 3 bit from RGB into each pixel usin
g OR operation from LSB in D.
Step 4: Convert set of binary bit each 8
-
bit is character, and repeat all bits in E.
Step 5: Put the Result secret message in F.
Step 6: Obtain object IoTs in G.
End
6.
T
E
ST
O
F
T
H
E
RE
S
UL
T
T
h
i
s
s
e
c
t
i
o
n
o
f
f
e
r
s
a
n
a
n
a
l
y
s
i
s
o
f
t
h
e
p
r
o
p
o
s
e
d
s
y
s
t
e
m
,
w
h
e
n
u
s
e
s
d
u
a
l
m
e
t
h
o
d
c
r
y
p
t
o
g
r
a
p
h
y
a
n
d
s
t
e
g
a
n
o
g
r
a
p
h
y
a
n
d
s
a
v
e
o
b
j
e
c
t
i
n
I
o
T
s
.
T
o
h
i
d
e
s
e
c
r
e
t
m
e
s
s
a
g
e
i
n
c
o
v
e
r
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
t
o
o
b
t
a
i
n
e
d
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
s
a
v
e
i
n
s
e
r
v
e
r
u
s
e
s
I
o
T
d
a
t
a
s
t
r
e
a
m
t
e
c
h
n
i
q
u
e
s
.
T
a
b
l
e
1
i
n
d
i
c
a
t
e
s
f
o
r
d
i
f
f
e
r
e
n
c
e
b
e
t
w
e
e
n
o
r
i
g
i
n
a
l
,
e
n
c
r
y
p
t
i
o
n
-
2
F
S
,
a
n
d
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
s
i
n
i
m
p
l
e
m
e
n
t
a
t
i
o
n
s
y
s
t
e
m
.
T
a
b
l
e
2
i
n
d
i
c
a
t
e
s
e
v
a
l
u
a
t
i
o
n
s
y
s
t
e
m
f
o
r
P
S
N
R
,
M
S
E
,
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
,
h
i
s
t
o
g
r
a
m
,
e
n
t
r
o
p
y
.
T
h
e
P
S
N
R
i
n
f
o
u
r
t
e
s
t
s
t
h
e
r
a
n
g
e
i
n
o
r
i
g
i
n
a
l
i
m
a
g
e
f
r
o
m
9
6
.
6
0
2
4
t
o
0
.
8
9
5
9
,
t
h
e
r
a
n
g
e
i
n
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
f
r
o
m
1
.
5
2
8
1
t
o
1
.
5
6
4
4
,
a
n
d
a
l
s
o
t
h
e
r
a
n
g
e
i
n
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
f
r
o
m
1
.
5
2
8
2
t
o
1
.
5
6
5
9
.
T
h
e
M
S
E
i
n
f
o
u
r
t
e
s
t
s
i
n
o
r
i
g
i
n
a
l
i
m
a
g
e
f
r
o
m
9
3
3
2
.
1
0
6
6
t
o
2
6
1
4
0
.
2
8
4
6
,
t
h
e
r
a
n
g
e
i
n
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
f
r
o
m
1
4
9
6
4
.
5
7
3
0
t
o
1
4
5
2
0
.
2
2
5
8
,
a
n
d
a
l
s
o
t
h
e
r
a
n
g
e
i
n
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
f
r
o
m
1
4
9
6
4
.
5
8
2
0
t
o
1
4
5
2
0
.
2
2
5
8
.
N
o
t
e
i
n
t
h
i
s
t
e
s
t
s
h
o
w
n
t
h
e
r
a
n
g
e
o
f
P
S
N
R
i
s
d
e
c
r
e
a
s
e
s
,
b
u
t
t
h
e
r
a
n
g
e
o
f
M
S
E
i
s
i
n
c
r
e
a
s
e
d
.
A
n
d
t
h
e
e
n
t
r
o
p
y
i
n
f
o
u
r
t
e
s
t
s
o
f
t
h
e
r
a
n
g
e
i
n
o
r
i
g
i
n
a
l
i
m
a
g
e
,
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
,
a
n
d
s
t
e
g
o
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
f
r
o
m
7
.
7
5
2
9
t
o
7
.
9
5
6
0
.
T
h
e
s
e
c
u
r
i
t
y
a
n
d
t
r
a
n
s
p
a
r
e
n
c
y
o
f
s
y
s
t
e
m
i
s
v
e
r
y
s
t
r
o
n
g
,
b
e
c
a
u
s
e
u
s
i
n
g
2
F
S
,
a
n
d
h
i
d
e
s
e
c
r
e
t
m
e
s
s
a
g
e
u
s
i
n
g
c
o
s
i
n
e
s
e
c
r
e
t
k
e
y
,
m
a
k
e
f
o
r
m
e
s
s
a
g
e
w
i
t
h
o
u
t
s
e
n
s
i
t
i
v
e
i
t
b
y
a
t
t
a
c
k
e
r
s.
T
ab
le
1
.
I
n
d
icate
s
d
if
f
er
e
n
t b
e
twee
n
o
r
ig
in
al,
e
n
cr
y
p
tio
n
-
2
F
S,
an
d
Steg
o
-
e
n
cr
y
p
ti
o
n
im
ag
es
N
o
.
o
f
i
ma
g
e
O
r
i
g
i
n
a
l
i
ma
g
e
En
c
r
y
p
t
i
o
n
i
ma
g
e
s
-
FS
S
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
I
mag
e
1
I
ma
g
e
2
I
mag
e
3
I
mag
e
4
T
a
b
le
2
.
I
n
d
icate
s
ev
alu
atio
n
s
y
s
tem
o
f
MSE
,
PS
NR
,
co
r
r
elatio
n
co
ef
f
icien
t,
an
d
e
n
tr
o
p
y
N
a
me
o
f
i
ma
g
e
P
S
N
R
M
S
E
C
o
r
r
e
l
a
t
i
o
n
C
o
e
f
f
i
c
i
e
n
t
En
t
r
o
p
y
I
mag
e
1
O
r
i
g
i
n
a
l
9
6
.
6
0
2
4
9
3
3
2
.
1
0
6
6
0
.
9
6
7
8
7
.
7
5
2
9
I
mag
e
1
E
n
c
r
y
p
t
i
o
n
2
F
S
1
.
5
2
8
1
1
4
9
6
4
.
5
7
3
0
0
.
0
0
8
5
7
.
9
2
7
1
I
mag
e
1
S
t
e
g
o
-
n
c
r
y
p
t
i
o
n
1
.
5
2
8
2
1
4
9
6
4
.
5
8
2
0
0
.
0
3
0
9
7
.
9
2
7
1
I
mag
e
2
O
r
i
g
i
n
a
l
2
.
2
7
8
0
8
3
1
8
.
9
1
5
7
0
.
9
6
4
5
7
.
7
6
3
2
I
mag
e
2
E
n
c
r
y
p
t
i
o
n
2
F
S
1
.
4
9
4
9
1
5
3
8
5
.
7
7
0
0
0
.
0
2
3
8
7
.
9
1
6
7
I
mag
e
2
S
t
e
g
o
-
n
c
r
y
p
t
i
o
n
1
.
4
9
5
2
1
5
3
8
5
.
7
7
6
3
0
.
0
1
1
4
7
.
9
1
6
7
I
mag
e
3
O
r
i
g
i
n
a
l
1
.
7
8
1
0
1
2
1
7
4
.
2
5
8
2
0
.
9
3
4
5
7
.
7
9
5
3
I
mag
e
3
E
n
c
r
y
p
t
i
o
n
2
F
S
1
.
5
6
1
9
1
4
5
5
0
.
0
1
3
4
-
0.
0
1
1
8
7
.
9
4
5
5
I
mag
e
3
S
t
e
g
o
-
n
c
r
y
p
t
i
o
n
1
.
5
6
2
3
1
4
5
5
0
.
0
1
9
8
0
.
0
1
3
1
7
.
9
4
5
5
I
mag
e
4
O
r
i
g
i
n
a
l
0
.
8
9
5
9
2
6
1
4
0
.
2
8
4
6
0
.
9
4
6
2
7
.
6
0
4
9
I
mag
e
4
E
n
c
r
y
p
t
i
o
n
2
F
S
1
.
5
6
4
4
1
4
5
2
0
.
2
2
5
8
0
.
0
1
5
0
7
.
9
5
6
0
I
mag
e
4
S
t
e
g
o
-
n
c
r
y
p
t
i
o
n
1
.
5
6
5
9
1
4
5
2
0
.
2
2
6
6
-
0
.
0
1
3
4
7
.
9
5
6
0
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Du
a
l m
eth
o
d
cryp
to
g
r
a
p
h
y
im
a
g
e
b
y
tw
o
fo
r
ce
s
ec
u
r
e
a
n
d
…
(
Ma
is
a
'a
A
b
id
A
li K
.
A
l
-
Da
b
b
a
s
)
2935
6.
1
.
H
is
t
o
g
ra
m
T
h
e
h
i
s
t
o
g
r
a
m
d
i
s
p
l
a
y
s
t
h
e
a
c
c
u
r
a
t
e
a
p
p
e
a
r
a
n
c
e
o
f
a
l
l
p
i
x
e
l
s
i
n
t
h
e
i
m
a
g
e
.
T
a
b
l
e
3
i
n
d
i
c
a
t
e
s
t
h
e
h
i
s
t
o
g
r
a
m
o
f
t
h
e
o
r
i
g
i
n
a
l
im
a
g
e
,
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
2
F
S
,
a
n
d
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
.
T
h
e
h
i
s
t
o
g
r
a
m
s
h
o
ws
t
h
e
v
a
r
i
a
ti
o
n
i
n
t
h
e
p
r
o
p
o
s
e
d
s
y
s
t
e
m
a
m
o
n
g
t
h
e
o
r
i
g
i
n
a
l
i
m
a
g
e
a
n
d
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
2
F
S
b
u
t
s
h
o
w
s
t
h
e
s
i
m
i
la
r
i
t
y
a
m
o
n
g
t
h
e
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
2
F
S
a
n
d
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e.
T
h
i
s
s
y
s
t
e
m
i
n
d
i
c
a
t
es
e
x
e
c
u
tio
n
i
s
g
o
o
d
f
o
r
h
i
d
i
n
g
a
s
e
c
r
et
m
e
s
s
a
g
e
.
T
h
e
s
i
m
i
l
a
r
ity
b
e
t
w
e
e
n
e
n
c
r
y
p
t
i
o
n
2
FS
a
n
d
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
es
i
n
d
ica
t
e
s
t
h
a
t
it
p
r
e
v
e
n
ts
t
h
e
d
e
t
e
c
ti
o
n
o
f
t
h
e
s
e
c
r
et
m
e
s
s
a
g
e
f
r
o
m
a
t
t
a
c
k
e
r
s
.
T
a
b
l
e
3
s
h
o
w
s
t
h
e
h
is
t
o
g
r
a
m
o
f
t
h
e
p
r
o
p
o
s
e
d
s
y
s
te
m
.
T
ab
le
3
.
I
n
d
icate
s
d
if
f
er
e
n
t h
is
to
g
r
am
b
etwe
en
o
r
ig
i
n
al,
en
cr
y
p
tio
n
-
2
FS
,
an
d
s
teg
o
-
e
n
cr
y
p
tio
n
im
ag
es
N
o
.
o
f
i
ma
g
e
O
r
i
g
i
n
a
l
i
ma
g
e
En
c
r
y
p
t
i
o
n
i
ma
g
e
2
F
S
S
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
ma
g
e
I
mag
e
1
I
mag
e
2
I
mag
e
3
I
mag
e
4
6
.
2
.
Co
rr
el
a
t
io
n c
o
e
f
f
icient
T
h
e
v
a
l
u
e
o
f
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
i
s
n
e
a
r
t
o
1
,
w
h
e
n
t
h
e
v
a
l
u
e
o
f
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
i
s
n
e
a
r
t
o
0
.
T
h
i
s
s
y
s
t
e
m
i
s
g
o
o
d
i
n
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
,
b
e
c
a
u
s
e
u
s
i
n
g
e
n
c
r
y
p
t
i
o
n
2
F
S
a
l
g
o
r
i
t
h
m
s
a
p
p
l
i
e
d
i
n
o
r
i
g
i
n
a
l
i
m
a
g
e
,
a
n
d
i
t
u
s
e
s
c
o
n
c
e
a
l
e
d
s
e
c
r
e
t
m
e
s
s
a
g
e
i
n
t
o
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
.
T
h
e
r
a
n
g
e
o
f
v
a
l
u
e
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
i
n
f
o
u
r
t
e
s
t
s
i
n
o
r
i
g
i
n
a
l
f
r
o
m
0
.
9
6
5
6
t
o
0
.
9
4
7
8
,
t
h
e
r
a
n
g
e
i
n
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
f
r
o
m
-
0
.
0
0
1
8
t
o
0
.
0
1
7
3
,
a
n
d
a
l
s
o
t
h
e
r
a
n
g
e
i
n
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
f
r
o
m
-
0
.
0
0
1
8
t
o
0
.
0
1
7
3
.
T
h
e
T
a
b
l
e
4
i
n
d
i
c
a
t
e
s
d
i
f
f
e
r
e
n
t
c
o
r
r
e
l
a
t
i
o
n
c
o
e
f
f
i
c
i
e
n
t
b
e
t
w
e
e
n
o
r
i
g
i
n
a
l
,
e
n
c
r
y
p
t
i
o
n
-
2
F
S
a
n
d
s
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
m
a
g
e
s
.
T
h
i
s
s
t
a
t
u
s
i
n
d
i
c
a
t
e
d
s
y
s
t
e
m
v
e
r
y
r
o
b
u
s
t
n
e
s
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
18
,
No
.
6
,
Dec
em
b
e
r
2
0
2
0
:
2
9
2
8
-
2
9
3
8
2936
T
ab
le
4
.
I
n
d
icate
s
d
if
f
er
e
n
t c
o
r
r
elatio
n
co
ef
f
icien
t b
etwe
en
o
r
ig
in
al,
en
cr
y
p
tio
n
-
2
FS
,
an
d
s
teg
o
-
e
n
c
r
y
p
ti
o
n
ima
g
e
s
N
o
.
o
f
i
ma
g
e
O
r
i
g
i
n
a
l
i
ma
g
e
En
c
r
y
p
t
i
o
n
i
ma
g
e
2
F
S
S
t
e
g
o
-
e
n
c
r
y
p
t
i
o
n
i
ma
g
e
I
mag
e
1
I
mag
e
2
I
mag
e
3
I
ma
g
e
4
6
.
3
.
H
i
g
h c
a
pa
cit
y
T
h
e
co
n
ce
al
ca
p
ac
ity
d
eter
m
i
n
es
th
e
m
ax
n
u
m
er
al
o
f
b
its
,
it
ca
n
b
e
co
n
ce
alin
g
in
en
cr
y
p
tio
n
im
ag
e
(
2
2
5
x
2
2
5
)
a
n
d
th
e
n
u
m
b
e
r
o
f
b
it
in
th
e
s
ec
r
et
m
ess
ag
e
f
o
r
a
n
ac
ce
p
t
v
alu
e
in
th
is
s
y
s
tem
o
f
th
e
r
esu
ltan
t
s
teg
o
-
en
cr
y
p
tio
n
im
ag
e
.
T
h
e
p
r
o
p
o
s
e
d
s
y
s
tem
h
av
e
b
est
e
x
ec
u
tio
n
it
h
as
b
i
g
m
ess
ag
e
co
n
ce
ali
n
g
ca
p
ac
ity
eq
u
al
to
4
4
ch
ar
ac
te
r
o
r
3
5
2
b
its
.
I
n
th
e
p
r
o
p
o
s
ed
al
g
o
r
ith
m
.
T
h
er
ef
o
r
e,
th
e
ca
p
ac
ity
o
f
th
e
h
id
in
g
r
ate
in
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
is
eq
u
al
to
th
e
n
u
m
b
er
o
f
c
h
ar
ac
t
er
s
/s
ize
o
f
th
e
im
ag
e.
Fo
r
3
5
2
b
its
/5
0
6
2
5
e
q
u
al
0
.
0
0
6
9
5
,
a
n
d
f
o
r
ex
am
p
le,
f
o
r
7
2
0
b
its
/5
0
6
2
5
eq
u
al
0
.
0
1
4
2
2
.
T
h
e
r
an
g
e
o
f
ca
p
ac
ity
f
o
r
h
id
in
g
d
ata
in
en
cr
y
p
tio
n
im
ag
e
is
g
o
o
d
.
7.
CO
M
P
ARI
SO
N
WI
T
H
O
T
H
E
R
M
E
T
H
O
DS
T
h
is
s
ec
tio
n
o
f
f
er
s
an
aly
s
is
o
f
p
r
o
p
o
s
ed
s
y
s
tem
p
er
f
o
r
m
an
ce
with
o
th
er
m
eth
o
d
s
,
f
o
r
h
id
e
s
ec
r
et
m
ess
ag
e
in
to
en
cr
y
p
tio
n
im
a
g
e
s
.
an
d
c
o
m
p
ar
e
d
an
aly
s
is
s
y
s
tem
f
o
r
s
teg
o
-
en
cr
y
p
tio
n
f
o
r
(
PS
NR
,
MSE
)
,
as
s
h
o
wn
in
T
ab
le
5
.
T
h
e
b
etter
r
esu
lt
in
T
ab
le
5
is
clar
if
ied
by
b
o
l
d
f
o
n
t.
W
h
er
ea
s
th
e
in
cr
ea
s
ed
PS
NR
,
an
d
d
ec
r
ea
s
ed
MSE
in
s
teg
o
en
cr
y
p
tiio
n
,
th
at
g
iv
es
b
etter
r
esu
lt
c
o
m
p
ar
ed
with
o
r
ig
i
n
al
an
d
en
c
r
y
p
tio
n
im
ag
e
.
T
h
is
p
ap
er
is
u
s
ed
en
c
r
y
p
tio
n
im
a
g
e
in
c
o
n
ce
al
s
ec
r
et
m
ess
ag
e
is
v
ar
y
i
n
g
f
r
o
m
o
th
e
r
m
et
h
o
d
i
n
T
ab
le
5
.
T
h
e
[
1
3
,
1
6
,
1
8
,
2
2
]
h
as
u
s
ed
co
n
ce
al
s
ec
r
et
m
ess
ag
e
in
o
r
ig
in
al
im
ag
e
is
d
ir
ec
t
.
W
ith
o
u
t
en
cr
y
p
tio
n
f
o
r
o
r
ig
in
al
im
ag
e
,
wh
ile
th
e
p
r
o
p
o
s
ed
s
y
s
tem
h
as
u
s
ed
en
cr
y
p
tio
n
im
ag
e
an
d
co
n
ce
al
s
ec
r
et
m
ess
ag
e
is
b
etter
,
an
d
p
o
wer
f
u
l
.
T
h
e
PS
NR
an
d
MSE
in
p
r
o
p
o
s
ed
s
y
s
tem
is
1
.
5
2
8
2
an
d
1
4
9
6
4
.
5
8
2
0
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
Du
a
l m
eth
o
d
cryp
to
g
r
a
p
h
y
im
a
g
e
b
y
tw
o
fo
r
ce
s
ec
u
r
e
a
n
d
…
(
Ma
is
a
'a
A
b
id
A
li K
.
A
l
-
Da
b
b
a
s
)
2937
T
ab
le
5
.
C
o
m
p
a
r
is
o
n
with
o
th
er
m
eth
o
d
s
R
e
f
e
r
e
n
c
e
s
S
i
z
e
o
f
i
ma
g
e
P
S
N
R
M
S
E
R
e
f
.
1
3
2
5
5
×
2
5
5
5
2
.
3
9
2
6
0
.
3
7
4
8
R
e
f
.
1
6
2
5
5
×
2
5
5
9
0
.
1
8
5
5
0
.
0
0
0
0
4
1
9
6
R
e
f
.
1
8
2
5
5
×
2
5
5
5
8
.
8
4
7
2
0
.
0
8
4
8
R
e
f
.
2
2
3
0
0
×
2
2
6
0
.
5
1
1
0
3
7
9
3
6
.
4
1
6
9
P
r
o
p
o
se
d
s
y
st
e
m
2
5
5
×
2
5
5
1
.
5
2
8
2
1
4
9
6
4
.
5
8
2
0
8.
CO
NCLU
SI
O
N
T
h
is
p
ap
er
o
f
f
e
r
s
th
e
p
r
o
p
o
s
ed
s
y
s
tem
to
h
i
d
e
a
s
ec
r
et
m
ess
ag
e
in
s
id
e
en
cr
y
p
tio
n
im
ag
e
2
FS
u
s
in
g
L
SB
,
an
d
it
can
s
en
d
m
o
r
e
t
h
an
4
4
ch
ar
ac
te
r
s
in
a
s
ec
r
et
m
ess
ag
e
in
th
is
s
y
s
tem
.
T
h
e
attac
k
er
s
ex
clu
d
e
th
e
ex
is
ten
ce
s
ec
r
et
m
ess
ag
e
i
n
to
en
cr
y
p
tio
n
im
ag
e
w
h
en
th
e
s
en
s
o
r
tr
y
to
s
ec
r
et
r
etr
iev
e
i
m
ag
e
m
u
s
t b
e
u
s
in
g
s
ec
r
et
k
ey
,
a
n
d
n
o
t
allo
w
an
y
u
n
au
t
h
o
r
ized
en
ter
in
I
o
T
s
to
d
etec
ted
s
ec
r
et
m
ess
ag
e
an
d
n
o
t
ac
ce
p
ted
.
T
h
is
s
y
s
tem
in
d
icate
s
h
ig
h
ef
f
icien
cy
,
f
ast,
h
ig
h
r
o
b
u
s
tn
ess
,
h
ig
h
s
ec
u
r
ity
,
tr
an
s
p
a
r
en
cy
,
an
d
ca
p
ac
ity
,
wh
e
r
ea
s
th
is
s
y
s
tem
ex
ce
p
ted
an
y
s
ize
o
f
tex
t
s
ec
r
et
m
ess
ag
e
in
to
en
cr
y
p
tio
n
im
ag
e
to
o
b
tain
.
T
h
e
PS
NR
i
s
Var
u
s
MSE
,
wh
er
ea
s
th
e
PS
NR
is
d
ec
r
ea
s
e
d
b
u
t
MSE
is
in
cr
ea
s
e
d
in
e
n
cr
y
p
tio
n
im
ag
e
a
n
d
s
teg
o
-
en
cr
p
tio
n
im
ag
e
f
r
o
m
o
r
ig
in
al
im
a
g
e
ex
p
lain
in
T
a
b
le
2
.
T
h
e
s
y
s
tem
e
v
alu
atio
n
th
r
o
u
g
h
m
ea
s
u
r
em
e
n
ts
PS
N
R
,
MSE
,
co
r
r
elatio
n
co
ef
f
icien
t,
en
tr
o
p
y
,
h
is
to
g
r
a
m
,
an
d
ca
p
ac
ity
,
it g
a
v
e
g
o
o
d
r
esu
lt in
all
m
ea
s
u
r
em
en
ts
.
RE
F
E
R
E
NC
E
S
[1
]
H.
S
in
g
h
,
N.
D
h
il
l
o
n
,
S
.
S
in
g
h
Ba
in
s
,
"
A
Ne
w
Ap
p
r
o
a
c
h
fo
r
Im
a
g
e
Cry
p
t
o
g
ra
p
h
y
Tec
h
n
i
q
u
e
s
,
"
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
&
Or
g
a
n
iz
a
ti
o
n
T
re
n
d
s
,
v
o
l
.
3
,
n
o
.
9,
pp
.
4
0
4
-
4
0
8
,
2
0
1
3
.
[2
]
K.
M
a
isa
'
a
Ab
id
Ali,
a
n
d
J.
S
h
a
t
h
a
Ha
b
e
e
b
,
“
Co
n
c
e
a
led
S
e
c
re
t
L
e
tt
e
r
Us
in
g
a
2
DWa
v
e
let
P
a
c
k
e
t
,
"
2
nd
Co
n
fer
e
n
c
e
In
ter
n
a
t
io
n
a
l
o
f
M
a
th
e
ma
ti
c
a
l
a
n
d
S
c
ien
c
e
s
AIP
C
o
n
fer
e
n
c
e
Pro
c
e
e
d
in
g
s
,
p
p
.
0
3
0
0
0
7
-
1
-
0
3
0
0
0
7
-
4
,
2
0
1
9
.
[3
]
S
h
.
Vi
jay
Ku
m
a
r,
S
.
De
v
e
sh
Kr.
,
a
n
d
M
.
P
ra
ti
sth
a
,
"
A
S
tu
d
y
o
f
S
teg
a
n
o
g
ra
p
h
y
Ba
se
d
Da
ta
Hi
d
i
n
g
Tec
h
n
i
q
u
e
s
,
"
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Eme
rg
i
n
g
Res
e
a
rc
h
i
n
M
a
n
a
g
e
me
n
t
&
T
e
c
h
n
o
lo
g
y
,
v
o
l
.
6
,
no
.
4
,
p
p
1
4
5
-
1
5
0
,
2
0
1
7
.
[4
]
K.
M
a
isa
'
a
Ab
id
Ali,
“
Hid
e
S
e
c
r
e
t
M
e
ss
a
g
e
s
in
Ra
ste
r
Im
a
g
e
s
fo
r
Tran
sm
issio
n
t
o
S
a
tell
it
e
s
u
si
n
g
a
2
-
D
Wa
v
e
let
P
a
c
k
e
t
,”
Ira
q
i
J
o
u
r
n
a
l
o
f
S
c
ien
c
e
,
vol
.
5
9
,
no
.
2
B
,
p
p
.
9
2
2
-
9
3
3
,
2
0
1
8
.
[5
]
S
.
P
a
ll
a
v
i,
a
n
d
S
.
S
m
ru
ti
R.
,
"
I
n
t
e
rn
e
t
o
f
T
h
i
n
g
s:
Arc
h
it
e
c
tu
re
s,
P
ro
to
c
o
ls,
a
n
d
Ap
p
li
c
a
ti
o
n
s
,
"
J
o
u
r
n
a
l
o
f
El
e
c
trica
l
a
n
d
Co
m
p
u
ter
E
n
g
i
n
e
e
rin
g
,
v
o
l
.
2
0
1
7
,
p
p
1
-
25
,
2
0
1
7
.
[6
]
D.
Din
a
G
a
m
a
l,
"
Im
p
ro
v
e
d
Lay
e
re
d
Arc
h
it
e
c
tu
re
fo
r
In
ter
n
e
t
o
f
Th
in
g
s
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ti
n
g
Aca
d
e
mic
Res
e
a
rc
h
(IJ
CAR
),
vol
.
4
,
no
.
4
,
p
p
.
2
1
4
-
2
2
3
,
2
0
1
5
.
[7
]
P
.
F
.
Dru
c
k
e
r,
"
In
ter
n
e
t
o
f
Th
i
n
g
s
:
P
o
siti
o
n
P
a
p
e
r
o
n
S
tan
d
a
rd
iza
ti
o
n
fo
r
Io
T
Tec
h
n
o
lo
g
ies
,
"
I
ER
C
,
b
o
o
k
,
2
0
1
5
.
[8
]
E.
Ho
p
a
h
a
n
d
O.
Va
y
v
a
y
,
"
I
n
te
rn
e
t
o
f
Th
in
g
s
(Io
T)
a
n
d
it
s
Ch
a
ll
e
n
g
e
s
fo
r
Us
a
b
il
it
y
in
De
v
e
l
o
p
in
g
Co
u
n
tri
e
s
,
"
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
I
n
n
o
v
a
ti
o
n
E
n
g
in
e
e
rin
g
a
n
d
S
c
ien
c
e
Res
e
a
rc
h
,
p
p
.
6
-
9
,
2
0
1
8
.
[9
]
N.
M.
M
.
Ab
d
.
El
n
a
p
i,
e
t
a
l.
,
"
A
S
u
r
v
e
y
o
f
In
ter
n
e
t
o
f
T
h
in
g
s
Te
c
h
n
o
l
o
g
ies
a
n
d
P
r
o
jec
ts
fo
r
He
a
lt
h
c
a
re
S
e
rv
ice
s
,
"
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
I
n
n
o
v
a
ti
v
e
T
re
n
d
s i
n
Co
m
p
u
ter
E
n
g
in
e
e
rin
g
(IT
CE)
,
p
p
.
4
8
-
55
,
2
0
1
8
.
[1
0
]
A.
S
h
a
fa
li
,
"
Im
a
g
e
E
n
c
ry
p
ti
o
n
T
e
c
h
n
iq
u
e
s
Us
in
g
F
ra
c
tal
F
u
n
c
ti
o
n
:
A
Re
v
iew
,
"
I
n
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
C
o
mp
u
ter
S
c
ien
c
e
&
In
fo
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
(IJ
CS
IT
)
,
vol
.
9
,
no
.
2
,
p
p
.
53
-
68
,
2
0
1
7
.
[1
1
]
P
.
Be
n
n
i
,
a
n
d
R.
He
tt
y
,
"
A
Ne
w
M
o
d
if
ied
Ca
e
sa
r
Cip
h
e
r
Cry
p
to
g
ra
p
h
y
M
e
th
o
d
wi
th
Leg
ib
le
Ci
p
h
e
rtex
t
fr
o
m
A
M
e
ss
a
g
e
to
Be
E
n
c
ry
p
ted
,
"
El
se
v
i
e
r,
In
ter
n
a
t
io
n
a
l
Co
n
fer
e
n
c
e
o
n
C
o
mp
u
ter
S
c
ien
c
e
a
n
d
Co
mp
u
t
a
ti
o
n
a
l
In
telli
g
e
n
c
e
(ICCS
CI
2
0
1
5
)
,
Pr
o
c
e
d
ia
Co
mp
u
ter
S
c
ien
c
e
,
v
o
l.
5
9
,
p
p
.
1
9
5
-
2
0
4
,
2
0
1
5
.
[1
2
]
Z.
Ab
d
u
l
Alif,
H.
M
e
h
d
i,
A.
Wa
h
a
b
Ai
n
u
d
d
i
n
Wah
id
,
e
t
a
l.
,
"
Hig
h
-
Ca
p
a
c
it
y
Im
a
g
e
S
teg
a
n
o
g
ra
p
h
y
with
M
i
n
imu
m
M
o
d
if
ied
Bit
s Ba
se
d
o
n
Da
ta M
a
p
p
i
n
g
a
n
d
LS
B
S
u
b
sti
tu
ti
o
n
,
"
A
p
p
li
e
d
S
c
ien
c
e
s (M
DPI)
,
p
p
.
1
-
19
,
2
0
1
8
.
[1
3
]
J.
Ka
m
a
ld
e
e
p
,
G
.
S
wa
ti
,
a
n
d
Y.
Ra
jk
u
m
a
r,
"
A
Ne
w
M
e
t
h
o
d
o
f
I
m
a
g
e
S
teg
a
n
o
g
ra
p
h
y
Us
i
n
g
7
t
h
Bit
o
f
a
P
ix
e
l
a
s
In
d
ica
to
r
b
y
I
n
tro
d
u
c
i
n
g
t
h
e
S
u
c
c
e
ss
iv
e
Tem
p
o
ra
ry
P
ix
e
l
i
n
th
e
G
ra
y
S
c
a
le
Im
a
g
e
,
”
J
o
u
rn
a
l
o
f
C
o
m
p
u
ter
Ne
two
rk
s
a
n
d
c
o
mm
u
n
ica
ti
o
n
s
,
v
o
l
.
2
0
1
8
,
p
p
.
1
-
11
,
2
0
1
8
.
[1
4
]
A.
F
a
tma
,
S
.
M
o
h
a
m
m
e
d
,
A.
Ab
d
u
ll
a
,
a
n
d
A.
Da
wo
o
d
,
"
S
y
ste
m
a
ti
c
Re
v
iew
o
f
E
x
isti
n
g
Io
T
Arc
h
it
e
c
tu
re
s
S
e
c
u
rit
y
a
n
d
P
riv
a
c
y
Iss
u
e
s a
n
d
C
o
n
c
e
rn
s
,
"
In
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
A
d
v
a
n
c
e
d
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
Ap
p
li
c
a
ti
o
n
s
(IJ
ACS
A)
,
vol
.
1
0
,
no
.
7
,
p
p
.
2
2
3
-
2
5
1
,
2
0
1
9
.
[1
5
]
D.
L.
M
in
h
,
P
.
M
d
.
Ja
li
l,
H.
D
o
n
g
il
,
M
.
K
y
u
n
g
b
o
k
,
a
n
d
M
.
Hy
e
o
n
jo
o
n
,
"
A
S
u
rv
e
y
o
n
I
n
tern
e
t
o
f
T
h
in
g
s
a
n
d
Cl
o
u
d
Co
m
p
u
ti
n
g
fo
r
He
a
lt
h
c
a
re
,
"
El
e
c
tro
n
ics
(M
DPI)
,
p
p
.
1
-
49
,
2
0
1
9
.
[1
6
]
U.
A.
M
d
.
E
h
a
sn
Ali,
M
d
.
S
o
h
ra
wo
rd
i,
M
d
.
P
a
las
h
U
d
d
i
n
,
“
A
Ro
b
u
st
a
n
d
S
e
c
u
re
d
Im
a
g
e
S
teg
a
n
o
g
ra
p
h
y
u
sin
g
LS
B
a
n
d
Ra
n
d
o
m
Bit
S
u
b
stit
u
ti
o
n
,”
A
me
ric
a
n
J
o
u
rn
a
l
o
f
E
n
g
in
e
e
rin
g
Res
e
a
rc
h
(AJER
)
,
v
o
l
.
8
,
p
p
.
39
-
44
,
2
0
1
9
.
[1
7
]
Au
n
g
M
y
in
t
Ay
e
,
“
LS
B
Ba
se
d
I
m
a
g
e
S
teg
a
n
o
g
ra
p
h
y
fo
r
In
f
o
rm
a
ti
o
n
S
e
c
u
rit
y
S
y
ste
m
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
T
re
n
d
i
n
S
c
ie
n
ti
fi
c
Res
e
a
rc
h
a
n
d
De
v
e
lo
p
me
n
t
(IJ
T
S
RD)
,
v
o
l
.
3
,
p
p
.
3
9
4
-
4
0
0
,
2
0
1
8
.
[1
8
]
K.
As
h
it
a
,
a
n
d
P
.
S
m
it
h
a
Va
s,
"
Ra
n
d
o
m
ize
d
S
te
g
a
n
o
g
rp
a
h
y
in
S
k
in
To
n
e
Im
a
g
e
s",
I
n
ter
n
a
ti
o
n
a
l
J
o
u
r
n
a
l
o
f
C
o
mp
u
ter
S
c
ien
c
e
,
En
g
in
e
e
rin
g
a
n
d
In
f
o
rm
a
ti
o
n
T
e
c
h
n
o
l
o
g
y
(IJ
C
S
EIT
)
,
v
o
l
.
8
,
no
.
2
/
3
,
p
p
.
1
-
8
,
2
0
1
8
.
[
1
9
]
U
.
A
.
M
d
.
E
h
a
s
n
A
l
i
,
M
d
.
S
o
h
r
a
w
o
r
d
i
,
a
n
d
M
d
.
P
a
l
a
s
h
U
d
d
i
n
,
"
A
R
o
b
u
s
t
a
n
d
S
e
c
u
r
e
d
I
m
a
g
e
S
t
e
g
a
n
o
g
r
a
p
h
y
u
s
i
n
g
L
S
B
a
n
d
R
a
n
d
o
m
B
i
t
S
u
b
s
t
i
t
u
t
i
o
n
,
"
A
m
e
r
i
c
a
n
J
o
u
r
n
a
l
o
f
E
n
g
i
n
e
e
r
i
n
g
R
e
s
e
a
r
c
h
(
A
J
E
R
)
,
v
o
l
.
8
,
no
.
2
,
p
p
.
39
-
44
,
2
0
1
9
.
[2
0
]
D.
Din
a
G
a
m
a
l,
"
Im
p
ro
v
e
d
Lay
e
re
d
Arc
h
it
e
c
tu
re
fo
r
In
tern
e
t
o
f
Th
in
g
s
,
"
I
n
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
mp
u
ti
n
g
Aca
d
e
mic
Res
e
a
rc
h
(IJ
CAR
)
,
vol
.
4
,
no
.
4
,
p
p
.
2
1
4
-
2
2
3
,
2
0
1
5
.
[
2
1
]
A.
M
o
h
a
m
m
a
d
A
s
a
d
,
e
t
a
l
.
,
"
A
d
d
r
e
s
s
i
n
g
t
h
e
F
u
t
u
r
e
D
a
t
a
M
a
n
a
g
e
m
e
n
t
C
h
a
l
l
e
n
g
e
s
i
n
I
o
T
:
A
P
r
o
p
o
s
e
d
F
r
a
m
e
w
o
r
k
,”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
A
d
v
a
n
c
e
d
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
a
n
d
A
p
p
l
i
c
a
t
i
o
n
s
(
I
J
A
C
S
A
)
,
vol
.
8
,
no
.
5
,
p
p
1
9
7
-
207
,
2
0
1
7
.
Evaluation Warning : The document was created with Spire.PDF for Python.