Turkish Journal of Physiotherapy and Rehabilitation; 32(3) ISSN 2651-4451 | e-ISSN 2651-446X

A NOVEL METHOD USING IMAGE STEGANOGRAPHY AND GPS

Madhavarapu Chandhan1, Dr. K. Reddy Madhavi2, U. Ganesh Naidu3, Dr. Padmavathi Kora4 1Department of CSE, Koneru Lakshmaiah Eduaction Foundation, Vaddeswaram, A.P, India, [email protected] 2Associate Professor of CSE, Sree Vidyanikethan Engineering College(Autonomous) Tirupati A.P, India, [email protected] 3Assistant Professor of CSE, B V Raju Institute of Technology Narsapur, A.P, India, [email protected] 4Professor of ECE, GRIET, Telengana Hyderabad, India, [email protected]

ABSTRACT

Geo tagging has become a new miracle that allows customers to portray and monitor photo collections in numerous new and interesting ways. Fortunately, manual geotagging of an enormous number of images on the globe remains a tedious and lasting task despite the continuing development of geotagging gadgets. At the same time, customers provide label explanations for their photos regularly, which can contain helpful geographic indications. In this paper we investigate the use of comments for the collection of images. Using a collection of more than 1,000,000 geotagged pictures, we create area probability maps for tag explanations worldwide. These guides reflect the aggregate photography and labelling practises of thousands of customers around the world. We study the geographical entropy and recurrence of customer labels as highlights and investigate the usefulness of using these highlights to choose geologically significant comments in a probabilistic system. We show that geosignificant tags recognise the semantic importance of the label itself, and that by analysing the label maps itself, we can figure out which labels are urban areas or countries. In addition, client explanations alone are used to interpret the field of images with great precision.

Keywords: Geo tagging, image processing, information retrieval,Steganography;

I. INTRODUCTION We live in an age of data contacted by innovation, whether it's work, fun, travel or correspondence in all parts of our reality. The extent to which data penetrate our lives today is evident from the growth of individual and local Internet impressions, the continuous improvement of correspondence methods, and the rapid advancement of Internet members (such as Flickr®, TwitterTM and Facebook) in virtual partnerships[1], among others. In some ways, man changed from a social being to an e-social being. Photos and video show a huge amount of Web data that is added or traded every second. In this explosion of individual and web-based interactive media information, the reputation of computerised cameras and camera phones has added[2]. We can see two distinct profiles of human presence or action on the planet in order to spur our perusers; (a) The world at night, which is caught up in lofty night times, when lit areas address human homes and exercises The user should take note that in Fig. 1 we do not overlay a world guide and the natural eye follows the lands and coastlines. These limits are authentic in Fig. 1(a), where the earth is seen lofty, but just virtual in Fig. 1 (b). Notice the similarity between the two guides, taking a leap in the direction of the more populated areas.

www.turkjphysiotherrehabil.org 807

Turkish Journal of Physiotherapy and Rehabilitation; 32(3) ISSN 2651-4451 | e-ISSN 2651-446X

Fig. 1 Two iconic views of our world. a The World at Night b The Photographed World More notable levels of photographic movement are generally appreciated[3]. Although this is generally true, a few pockets of concentrated energy in the base guide contrast habitats and photography examples, possibly in deserts, stores and public stops where more visitors than inhabitants are without doubt found[4]. [4]. The above is only one example of a useful induction from a wide range of data. It is essential to stress that it is impossible to plan the world images[5] (Fig. 1(b)) without the contribution of persons who geotagged their photographs. This paper therefore honours geotagging and examines how this wonder alters the nature of interactive media research.

Geotagging or geo-reference, such as images and recordings on web pages, websites or photometrics sharing, are used to add topographic to different media [2, 4]. [2]. [2]. It can help customers locate a wide range of area-specific data. You can, for example, discover photographs taken near a given area via the geotagging- enabled webcrawler in the scope and longitude coordinates or just by tapping on a Google Maps neighbourhood. Data management systems enabled by geotagging [6] can also be used to discover local news, websites and other resources. Persons have always expected a partner time and a place with pictures. This affiliation was previously more unmistakably demonstrated, for example by composing the date and location of the image on the reverse of the print. Geotagging led to increased geo-consciousness of sound and image repositories and examination networks. During the month, Yahoo Flickr collected some 4.7 million geotagged images and recordings. Flickr allows users to use geolocation data to tag their photos in two ways: as accurate or estimated geological directions via a guideline interface or as topographically significant watchwords. A sophisticated camera or PDA with a GPS receiving sensor may also provide the aid of a computerised camera which is able to communicate with an independent GPS receiver (e.g. via a Bluetooth® connection). Geotagging is also possible. Photographs can also be synchronized with a device for GPS tracking.

It has become a genuine test to oversee a particularly overpowering measure of sight and sound information. As of now, business web crawlers and Web collections depend on text comments related with pictures for ordering and recovery assignments. More extravagant and more exact semantic comment would profit numerous applications including picture search, sharing, association, and the executives [7]. Perceiving the requirement for semantic explanation, the most recent variant of the Google™ Picasa™ presently empowers clients to mark pictures as far as faces, spots, and client determined labels, as demonstrated in Fig. 2.

Over the most recent quite a while, a significant pattern that has been seen inside sight and sound agreement and PC vision spaces is the expanded accentuation on demonstrating and utilizing relevant data. Logical demonstrating frequently offers a chance to get more influence from information than pixels alone can give[8]. A couple of wellsprings of relevant data are: (I) meta-information caught with pictures or recordings (ii) connections between spatio worldly fragments in mixed media information or (iii) designs in sight and sound assortments all in all Geographic data has been embraced by media and vision scientists inside a relevant displaying structure. Notwithstanding, conceivable outcomes of displaying and removing esteem from topographical setting are numerous and change, as will be talked about.

II. RELATED WORKS Currently, there are several experts in the field of social figures research, who select coherent, portable information for the development and conduct of humans. DBSCAN Calculation for the purpose of separating the areas in which photographs are transferred from customers every now and then which are characterised by involvement zones to be examined. The [10] reference uses the vector support machine (SVM) for the www.turkjphysiotherrehabil.org 808

Turkish Journal of Physiotherapy and Rehabilitation; 32(3) ISSN 2651-4451 | e-ISSN 2651-446X preparation of information to get pictures of areas. Reference [11] Use a thickness based calculation to divide the territory into networks to obtain the thick district of the area. Reference] proposes a multidisciplinary strategy for the recognition of physical actions with the accent on including extraction and selection measures that are considered to be the most fundamental arrangements for differentiating elements of the main obscure motion. References [12] recognize clients' significant spots furthermore, practices through their drawn out persistent GPS information [4] utilized the ceaseless area data transferred by remote organization to get clients' area and development mode. Notwithstanding, the significant expense, the restricted improvement of utilization, and upsetting clients' security are the lethal weaknesses of the strategy. Reference [13] attempts to dissect the photographs from versatile and analyzed to the realized beautiful then foresee the client area and achieve the course following as indicated by the time and spatial data. Furthermore, the geotagged photograph informational collection utilized in this paper is transferred by clients themselves with a variety of data, which is more helpful for research. The gathered information should be isolated into different groupings dependent on clients' places and practices. Presently, the SVM order calculation and RBF neural organization [14] are normally utilized. We use LIBSVM [15] and the neural network device provided by Matlab to characterize the information.

Soft biometric features can be defined by giving some information about the person, but are lacking the distinctive features and durability to distinguish two individuals sufficiently. Either continual (e.g. height, weight etc) or discrete (e.g. sex, eye colour, ethnicity etc.) can be the soft biometric traits[16]. The term soft biometry was first introduced to be a series of features that provide information about the individual, yet cannot authenticate the person individually, primarily because of a lack of distinctive and permanent characteristics [17].

Soft Biometric features can be described by humans as physical or behavioural features. Highness, weight, hair colour and ethnicity are the common examples of soft characteristics: not individually, they may be combined to provide biometric signatures for discriminatory purposes. In [18] the work further observed that soft biometrics are not expensive to compute, can be sensed at a distance, require the cooperation of supervisors and can restrict research from a group of survey subjects. Using primary biometric features to describe humans may not be always successful. Soft biometrics overcomes these difficulties through conversion between human and biometric descriptions. Most likely, a physical description of a suspect could be available in eye witness reports (eg., The culprit was a long man with bald head). This description can be turned into a soft biometric feature set by a suitable automation system. Therefore, soft biometrics can increase the overall efficiency of surveillance [19]. There are several challenges in extracting soft biometric characteristics. Characteristics like gender, colour of the eye and ethnicity are discreet. The constant variables are height and weight. Show that only a limited degree of exactness can be used to identify a person by a combination of personal attributes such as age, gender, eye colour, height and another visible identifier [20]. Therefore, a system based fully on soft biometrics cannot comply with real world applications' requirements for precision. The system should be able to extract the soft biometric features such as height, weight etc when the user interacts with the primary biometric system.

Showed by a combination of "light "(soft) biometric identifiers, such as body weight/height percentage[21], unobtrusive user identification may be conducted in non-safe applications, such as healthcare clubs. [22] proposes to use a large biometric database with soft biometric features such as gender and age. Filtering is about limiting the amount of entries to be looked for in a database based on the interacting user characteristics. Ore recently set the latest trends and possibilities in the field of soft biometrics, as opposed to studies of [23] and [24] [23]. The soft biometric characteristics [26] are defined as 'physical, behavioural or human characteristics, which can be classified into a human category that complies with the predefined categories.' Skin colour, eye colour, hair colour, beard presence, moustache present, height, weight etc. are physical characteristics. Functions such as a gait, keystroke, signature etc. are included. Colour, tattoos and accessories are the subjects of adhered human characteristics. In other words, "the soft biometric features are naturally created by humans, which are used to distinguish between them"[27]. These categories are different from the classical case of biometrics, which has been established by humans in order to differentiate people. Various soft biometric features can be used to overcome the limitations of single soft biometric features [28]. As the current study deals with "high" as the soft biometric characteristic, this area is explained in the following section.

III. PROPOSED SCHEME Applications using geo tagging may simplify the recovery of the board and photo. A confirmation package that can naturally retrieve and instal the turn data along with the picture information is therefore useful for these applications and guarantees that the material and area data are reliable and not tempered. For the reasons we referred to above, Figure 2 outlines conspired. On the client side, the client snaps a photo using a camera www.turkjphysiotherrehabil.org 809

Turkish Journal of Physiotherapy and Rehabilitation; 32(3) ISSN 2651-4451 | e-ISSN 2651-446X equipped with a frame for area data collection like a PDA camera cell. The customer side programme is activated when the image is taken. This programme, including confirmation data age and installation of information, is responsible for the problem.

This program's strategy is described as follows.

Stage 1: It facilitates the collection of area data including scope and longitude.

Stage 2: Writing in the JPEG record header of the picture the area data caught in the region.

Step 3: Applying the cryptographic hash work like Message-Digest calculation, along with the image information, to the area data, producing a group of 128 pieces in hashed value.

Stage 4: After the hashed estimation has been created, the customer programme inserts this hashed succession to the image data of the photo using a reversible calculation information and produces a stego photograph.

Fig 2:Architecture of the Proposed Scheme Clients can transfer the stego-photograph to the sharing site, which can give the board management an image recovery engine. The worker's programme meets the accompanying steps to ensure the right area data.

Stage 1: Reading the customer programme area data from the EXIF region.

Stage 2: applying the cryptographic hash capacity along with the picture information to field data recovered in Sync 1, and again creates a grouping of hazardous esteem.

Step 3: Extract the customer programme hash succession using the calculation removing information.

Stage 4: Comparison of the 2 successions and select the consent of the transfer of photographs

IV. RESULTS AND DISCUSSION The performance of the above geotagging stenography method is assessed on the basis of accuracy and distance. The experiment results are as follows:

www.turkjphysiotherrehabil.org 810

Turkish Journal of Physiotherapy and Rehabilitation; 32(3) ISSN 2651-4451 | e-ISSN 2651-446X

Figure 3. The presentation of five diverse label determination systems. The plots show the accuracy (independent data extent) with expanding distance resistance. James Hays' set (a) and (b) execution and Flickr set (c and d) are shown. All labels in (a) and (c) are considered for geo deduction. In (b) and (d), for geosurming only non-country and non-city labels are considered. Choosing a few training labels (3Inf) brings the best geolocation

We also review all the above methodologies following the removal of town and country labels from an image label. Fig. 3 examines the display on two different datasets of the systems above: I have a set of 237 photos used in [6] and [4] for the set and (ii) a magic set of 2219 Flickr pictures with fascinating geo-tag photos taken on a specific day. Fig. 6 shows consistency in execution of both datasets. The presentation of all techniques significantly improves the resilience of long distances. We can also see some fascinating examples. All tags are reliably outlined by systems using instructive labels (1Inf and 3Inf), possibly since there may be a link in the case of numerous labels that ignores the restrictive presumption of freedom in Baïve Bayes. 1Freq and 1Rand, true to their shape, are less fortunate than the rest. Fig. 6(b) and (d) illustrate the overall presentation when we bar labels for city and nation. The addition in Fig. 6(b) is more critical by extending the amount of lighting labels (3Inf versus 1inf) and (d). Most curiously, the geography of the photographs (300 km) with more than 25 per cent accuracy can be derived, even with non-country or non-city labels.

V. CONCLUSION AND WORK FOR THE FUTURE: This paper proposes a structure using image steganography and GPS data validation for the problem described. The consistency of the photographic substance and the area can be guaranteed by inserting GPS data as well as the checking data in the image. The photo labels contain data that have been identified with a picture catch area. We show that convincing geolocation is cultivated by inspecting the image labels. In addition, the semantic importance of the tag can be perceived over and over again by inspecting label maps. This plan can also be applied to validate that a customer has visited a specific place at any point. Coordinating this work with visual coordination is an important future heading.

REFERENCES: 1. Y. Zheng, X. Xie, and W.-Y. Ma, “Mining interesting locations and travel sequences from GPS trajectories,” in Proceedings of the 18th international conference on World Wide Web, ACM,2009. 2. McKercher and G. Lau, “Movement patterns of tourists within a destination,” Tourism Geographies, vol. 10, no. 3, pp.355–374, 2008. 3. Krumm and E. Horvitz, “LOCADIO: inferring motion and location from Wi-Fi signal strengths,” in Proceedings of the 1stAnnual International Conference on Mobile and Ubiquitous Systems:Networking and Services MOBIQUITOUS ’04), pp. 4–13,August 2004. 4. J. Rekimoto, T. Miyaki, and T. Ishizawa, “LifeTag: wiFi-based continuous location logging for life pattern analysis,” Locationand Context- Awareness, vol. 4718, pp. 35–49, 2007. 5. T. Rattenbury, N. Good, andM. Naaman, “Towards automatic extraction of event and place semantics from flickr tags,” in Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR ’07), pp. 103–110, ACM, July 2007. www.turkjphysiotherrehabil.org 811

Turkish Journal of Physiotherapy and Rehabilitation; 32(3) ISSN 2651-4451 | e-ISSN 2651-446X

6. Ganesh, D., Pavan Kumar, T.2018,"A survey on advances in security threats and its counter measures in cognitive radio networks",International Journal of Engineering and Technology(UAE),7(2.8 8), pp. 372-378. 7. Kumar, T.P., Srikanth, V., Reddy, B.L.2016,"Ascertainment of wormhole and black hole attacks inmanet using dowbalgorithm",ARPN Journal of Engineering and Applied Sciences,11(21), pp. 12614-12618. 8. Pavan Kumar, T., Kartheek, B.N.2016,"A neuro-fuzzy controller for multilevel renewable energy system",Indian Journal of Science and Technology,9(12). 9. D. Ganesh, T. Pavan Kumar, M. Sunil Kumar, “Optimized Levenshtein Centroid Cross Layer Defense For Multi Hop Cognitive Radio Networks,” IET Communications, Vol. 15, No.2 , pp. 246-258, Jan. 2021. 10. D. Ganesh, T. Pavan Kumar, M. S Kumar, ”Efficient Energy Management for Reducing Cross Layer Attacks in Cognitive Radio Networks,” Journal of Green Engineering ,Vol. 11, No. 2, pp. 1412-1426, Mar. 2021. 11. D. Ganesh, T. Pavan Kumar, M. S Kumar, “A Dynamic And Adaptive Learning Mechanism To Reduce Cross Layer Attacks In Cognitive Networks,” Elsevier Materials Today Journal,. Available: https://doi.org/10.1016/j.matpr.2020.11.143. 12. L. Liao, Location-based activity recognition [Ph.D. thesis], University of Washington, 2006. 13. C. Cortes and V. Vapnik, “Support-vector networks,” Machine Learning, vol. 20, no. 3, pp. 273–297, 1995. 14. D. Lowe and D. Broomhead, “Multivariable functional interpolation and adaptive networks,” Complex Systems, vol. 2, pp. 321–355, 1988. 15. C.-C. Chang and C.-J. Lin, “LIBSVM: a Library for support vector machines,” ACM Transactions on Intelligent Systems and Technology, vol. 2, no. 3, article 27, 2011. 16. J. Luo, M. Boutell, and C. Brown, An overview of exploiting context for semantic scene content understanding. IEEE Signal Processing Magazine, 23(2):101114, 2006. 17. Kumar MS, Neelima P. Design and implementation of scalable, fully distributed web crawler for a web search engine. International Journal of Computer Applications. 2011 Feb;15(7):8-13. 18. L. Kennedy, M. Naaman, S. Ahern, R. Nair, and T. Rattenbury. How Flickr helps us make sense of the world: context and content in community- contributed media collections. ACM International Conference on Multimedia, 2007. 19. A. Gallagher, D. Joshi, J. Yu and J. Luo. Geo-location Inference from Image Content and User Tags, CVPR Workshop in Internet Vision, 2009. 20. Kumar MS, Harshitha D. Process Innovation Methods on Business Process Reengineering. Int. J. Innov. Technol. Explor. Eng. 2019. 21. J. Hays and A. Efros. IM2GPS: estimating geographic information from a single image. IEEE International Conference on Computer Vision and Pattern Recognition, 2008. 22. G. Schindler, P. Krishnamurthy, R. Lublinerman, Y. Liu, and F. Dellaert. Detecting and Matching Repeated Patterns for Automatic Geo- tagging in Urban Environments. IEEE International Conference on Computer Vision and Pattern Recognition, 2008. 23. Balaji K, Kiran PS, Kumar MS. An energy efficient load balancing on cloud computing using adaptive cat swarm optimization. Materials Today: Proceedings. 2021 Jan 7. 24. J. Luo, D. Joshi, J. Yu and W. Hao. Event Recognition: Viewing the World with a Third Eye. ACM International Conference on Multimedia, 2008. 25. Sreedhar, B., Manjunath Swamy BE, and M. Sunil Kumar. "A Comparative Study of Melanoma Skin Cancer Detection in Traditional and Current Image Processing Techniques." In 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 654-658. IEEE, 2020. 26. Sangamithra, B., P. Neelima, and M. Sunil Kumar. "A memetic algorithm for multi objective vehicle routing problem with time windows." In 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE), pp. 1-8. IEEE, 2017. 27. Hsiang-Cheh Huang, Yueh-Hong Chen and Shin- Chang Chen “Copyright Protection for Images with EXIF Metadata” IEEE International Conferenceon Intelligent Information Hiding and Multimedia Signal Processing, 15-17 Aug. 2008 Page(s):239 – 242

www.turkjphysiotherrehabil.org 812