Conference Paper
Conference Paper
{x }
image formats: GIF, Bitmap, and PNG. Subsequently, a
comprehensive comparative analysis will be conducted to ij | 0 ≤ i ≤ PI gray, 0 ≤ i ≤ QI gray, x ij ∈ {0,1,2,…,255} (1)
evaluate the performance of these variants.
II. METHODOLOGY For a 24-bit color cover image denoted as Icolor of size PIcolor ×
A. Overview of the images-based steganography QIcolor is given in equation 2 as follows:
Fig.1 provides a visual representation of the process
involved in concealing secret messages within a given Icolor red =
medium, along with an overview of the components
comprising a typical steganographic system. The
illustration delineates two primary processes: embedding X red |0 ≤ i ≤ PIcolor red , xred ∈{0,1,2.....,255} (2)
ij
and extraction of text-based messages, carried out at the ij |0 ≤ i ≤ QIcolor red ,
sender and receiver's ends, respectively.
During the embedding process, secret messages are The n-bit of the secret message to be embedded into the 8-bit
concealed within a cover image using a stego-key, resulting grayscale and 24-bit color image, denoted as S, is defined by
in the generation of a stego-image. Subsequently, the stego- equation 3.
image is transmitted over a communication medium to the
S = {si | 0 ≤ i ≤ n, si ∈{0,1}}
intended recipient. At the receiver's end, the extraction
process involves retrieving the concealed messages from (3)
the received stego-image using the corresponding stego-
key. This enables the recovery of the original secret
messages embedded by the sender. The depicted processes
Furthermore, the secret message is rearranged to form a k-bit
elucidate the fundamental operations involved in
virtual message S ′ , which is defined in equation 4 as follows:
steganography, facilitating secure communication and data
concealment between parties.
At the receiver's end, the secret message is extracted from
the stego-image using the provided stego-key. Once the
'
{ ' '
S = s i|0 ≤ i ≤ n , si ∈ 0,1, .. , 2 { k −1
}}
extraction process is completed successfully, the concealed
message is revealed in its original text format. This final
(4)
step allows the recipient to access and interpret the hidden
'
information, ensuring the secure and accurate transmission Where n = PI gray× QI gray and n = PI color× QI color
of the intended message.
Furthermore, a mapping between the original secret message (S) III. RESULTS AND DISCUSSION
and the embedded message (S ′) is established, yielding equation
5 as follows: A. Computation of peak signal to noise ratio (PSNR)
k=1
Figure 2 illustrates a bar graph representing the computed average
'
s i = ∑ si × k + j × 2
k1 j
(5) PSNR for the considered variants (Stego 1, 2, 3, and 4), tested with
j=0 PNG, BMP, and GIF images. The graph demonstrates that as the
number of stego bits used to embed the secret message increases,
Therefore, the embedding process is completed for each pixel, the average PSNR value decreases. This observation indicates that
with k (where, k=1,2,3,4) bits of the rearranged message S ′ as more stego bits are replaced by the message bits, the stego-
stored in each pixel. Thus, each pixel stores the k-bit message image becomes more distorted, posing a potential security threat to
for a stego-pixel, which is formulated by equation 6 as follows: the concealed message.
Furthermore, the graph reveals that the PSNR for PNG images is
Xi' = xi mod2k + si (6) relatively higher for stego 1-3 bits compared to GIF images. The
PSNR for GIF images is relatively low compared to other image
formats, suggesting that GIF images may experience more
Lastly, the embedded image is extracted from the
distortion when used for steganographic embedding. These
stego- image using equation 7.
findings underscore the importance of selecting appropriate stego
parameters and image formats to ensure optimal security and
s'= xi mod 2k (7) image quality in steganographic applications.
Fig 1: Architecture
REFERENCES
[1] Blockchain to Disrupt Uber: Entering Ridesharing Industry,
LeewayHertz. Retrieved on 1st June, 2022 from
https://www.leewayhertz.com/blockchain-disrupting-uber-platform/
[2] RideX | Decentralized taxi experience on Ethereum Blockchain, UX
Fig 2: Registration Page Planet. Retrieved 1st June, 2022 from https://uxplanet.org/ridex-taxi-
service-on-ethereum-blockchain-fecee1879a23
[3] PeerPool: A Decentralized Ride Sharing Application. Retrieved 1st
June, 2022 from https://github.com/adityakeerthi/PeerPool
[4] DeRiS: Blockchain based Ride Sharing. Retrieved 1 st June, 2022 from
https://github.com/Nirvan66/DeRiS
[5] Kudva, Sowmya, Renat Norderhaug, Shahriar Badsha, Shamik
Sengupta, and A. S. M. Kayes. "Pebers: Practical ethereum blockchain
based efficient ride hailing service." In 2020 ieee international
conference on informatics, iot, and enabling technologies (iciot), pp.
422-428. IEEE, 2020.
[6] Baza, Mohamed, Noureddine Lasla, Mohamed MEA Mahmoud,
Gautam Srivastava, and Mohamed Abdallah. "B-ride: Ride sharing
with privacy-preservation, trust and fair payment atop public
blockchain." IEEE Transactions on Network Science and Engineering
Fig 3: Journey Route Page 8, no. 2 (2019): 1214-1229.
[7] Omar Dib, Kei-Léo Brousmiche, Antoine Durand, Eric Thea, Elyes
Ben Hamida. Consortium blockchains: Overview, applications and
VII. FUTURE SCOPE challenges. International Journal on Advances in Telecommunications,
IARIA, 2018.
We plan to move beyond a basic rating system towards a [8] V. Buterin et al., “Ethereum white paper: a next generation smartcontract
nuanced reputation system leveraging blockchain for tamper- & decentralized application platform,” First version, 2014.
proof data storage. Integration of in-app payments via [9] K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts
established gateways or cryptocurrency options, combined forthe internet of things,” Ieee Access, vol. 4, pp. 2292–2303, 2016.
with machine learning for optimized driver allocation, will [10] Benet, J. (2014). IPFS - Content Addressed, Versioned, P2P File
enhance user experience. Furthermore, expanding beyond cars System. ArXiv, abs/1407.3561.
to include bikes, scooters, and public transportation caters to a
wider audience and promotes sustainability.