Top Banner
 Presented by Maheshwara M FID8115MAH B.E-CSE.,IV yr PSNA C!!e"e # En"$neer$n" % &e'h D$nd$"(! ,&a)$!nad( E-Ma$! $d * shanter+")a$!.') Cnta't n * ++/005  C!$## 2e(ben 3a)a!esh FID818C4I B.E-CSE. IV r PSNA C!!e"e # En"$neer$n" % &e'h D$nd$"(! ,&a)$!nad( E-Ma$! $d * '!$##re(ben")a$!.') Cnta't n +8+//0
11

Image in image steganography

Jun 04, 2018

Download

Documents

Mahesh Wara
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 1/11

 

Presented by

Maheshwara MFID8115MAH

B.E-CSE.,IV yr

PSNA C!!e"e # En"$neer$n" % &e'hD$nd$"(! ,&a)$!nad(

E-Ma$! $d * shanter+")a$!.')

Cnta't n * ++/005 

C!$## 2e(ben 3a)a!esh

FID818C4I B.E-CSE. IV r PSNA C!!e"e # En"$neer$n" % &e'h

D$nd$"(! ,&a)$!nad(

E-Ma$! $d * '!$##re(ben")a$!.')Cnta't n +8+//0

Page 2: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 2/11

 ABSTRACT  

In a ste"an"ra6h$' syste) the 'n#$dent$a!

te7t r 'n#$dent$a! $)a"e $s h$dden $ns$de a

'er $)a"e $n red(ndant b$t 6s$t$ns. A#ter

the 'n#$dent$a! $n#r)at$n $s e)bedded

$nt the 'er $)a"e the 'han"e $n

a66earan'e # the 'er $)a"e sh(!d nt be

a66arent t na9ed eye: s that nbdy w$!!

s(s6e't that s)eth$n" $s there $ns$de. &

)a9e $t st$!! se'(re the 'n#$dent$a! te7t r

$)a"e 'an be en'ry6ted and e)bedded.

A#ter $t $s bta$ned at the re'e$er $t 'an be

de'ry6ted. In th$s 6a6er we hae (sed

Internat$na! data en'ry6t$n a!"r$th) t

en'ry6t the 'n#$dent$a! $n#r)at$n and the

en'ry6ted te7t r $)a"e $s e)bedded $nt

the 'er $)a"e $n the #!!w$n" )anner.

&he 'er $)a"e $s d$$ded $nt bytes. In

ea'h byte ne b$t # the en'ry6ted data $s t

 be e)bedded. In the #$rst byte the #$rst b$t

 6s$t$n, $n the se'nd byte the se'nd b$t

 6s$t$n, $n the th$rd byte the th$rd b$t

 6s$t$n and s n t$!! the 8th byte. A"a$n $n

the +th byte the #$rst b$t 6s$t$n, $n the 1/th

 byte the se'nd b$t 6s$t$n and s n t$!! the

1th byte. A"a$n $n the 10 th byte the 1st  b$t

 6s$t$n, $n the 18th byte the ;nd b$t 6s$t$n

And s n. &h$s tr$'9 $s 'nt$n(ed t$!! the

end # the en'ry6ted data. Nw th$s tta!

$)a"e sh(!d be sent t the re'e$er and

re'e$er sh(!d de'ry6t and "et the

'n#$dent$a! te7t r $)a"e.

Keywords-'$6her,ste"an"ra6hy,

'ry6t"ra6hy, en'ry6t$n, de'ry6t$n, ste",

e)bedd$n", $ntr(der.

 I. INTRODUCTION 

Ste"an"ra6hy $s the 6ra't$'e # h$d$n" 6r$ate

$n#r)at$n w$th $n s)eth$n" that a66ears t be

nth$n" (t # the (s(a!. Ste"an"ra6hy $s

'n#(sed w$th 'ry6t"ra6hy: bth are t 6rte't

 6r$ate $n#r)at$n. Cry6t"ra6hy (ses

en'ry6t$n and de'ry6t$n. <here as

ste"an"ra6hy (ses en'ry6t$n, e)bedd$n" $nt

a 'er $)a"e and de'ry6t$n. S ste"an"ra6hy

$s a tw !ee! se'(r$ty )e'han$s). Een $n

ste"an"ra6hy n bdy w$!! s(s6e't that s)e

h$dden data $s there . Ste"an"ra6hy 'an be three

ty6es. &hse are* Ste"an"ra6hy $n $)a"es,

ste"an"ra6hy $n a(d$ and ste"an"ra6hy $n

$de. &h$s 6a6er re6resents ste"an"ra6hy $n

$)a"e $.e. the #$rst 'ate"ry. In th$s ty6e the

'er$n" #$!e $s an $)a"e where the 6r$ate

$n#r)at$n $s t be e)bedded. Here 6r$ate

$n#r)at$n )eans 6r$ate te7t r 6r$ate $)a"e.

In se'nd 'ate"ry the 'er #$!e $s a $de

$ns$de wh$'h the 6r$ate $n#r)at$n $s t be

e)bedded. In th$rd 'ate"ry the 'er #$!e $s an

a(d$.

Page 3: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 3/11

<hen h$d$n" $n#r)at$n $ns$de $)a"es

(s(a!!y 4SB =!east s$"n$#$'ant b$t> )ethd $s

(sed. & a ')6(ter an $)a"e $s s$)6!y a

#$!e that shws the d$##erent '!rs and

$ntens$t$es # !$"ht n d$##erent areas # an

$)a"e. B(t $n )y wr9 I hae (sed a

d$##erent a66ra'h. In the #$rst byte the #$rst

 b$t 6s$t$n, $n the se'nd byte the se'nd

B$t 6s$t$n, $n the th$rd byte the th$rd b$t

 6s$t$n and s n t$!! the 8th byte. A"a$n $n

&he +th byte the #$rst b$t 6s$t$n, $n the 1/th

 byte the se'nd b$t 6s$t$n and s n t$!! the

1th byte. A"a$n $n the 10 th byte the 1st  b$t

 6s$t$n, $n the 18th byte the ;nd b$t 6s$t$n

and s n. &h$s tr$'9 $s 'nt$n(ed t$!! the end

# the en'ry6ted data. Here ne 6$nt we 'an

nte $s the !en"th # the 'er $)a"e sh(!d

 be 8 t$)es than the '$6her data. <e hae

d$##erent ty6es # $)a"e #$!es !$9e BMP,

?PE@ et'. I hae (sed ?PE@. ?PE@ "$es

"d 6er#r)an'e

<hen $n#r)at$n $s h$dden $ns$de $de the

 6r"ra) r 6ersn h$d$n" the $n#r)at$n

w$!! (s(a!!y (se the DC& =d$s'rete 's$ne

trans#r)> )ethd. DC& wr9s by s!$"ht!y

'han"$n" the ea'h # the $)a"es $n the

$de, s('h that $t $s nt nt$'eab!e.

Ste"an"ra6hy $n $de $s s$)$!ar t

ste"an"ra6hy $n $)a"e. <hen a s)a!!

a)(nt # $n#r)at$n $s h$dden $ns$de #

$de $t $s nt nt$'eab!e at a!!, hweer the

)re $n#r)at$n $t $s h$dden the )re

nt$'eab!e $t be')e. <hen h$d$n"

$n#r)at$n $ns$de a(d$ #$!es the te'hn$(e

(s(a!!y (sed $s !w b$t en'd$n" wh$'h $s

s)ewhat s$)$!ar t 4SB that $s "enera!!y

(sed $n $)a"es. &he 6rb!e) w$th !w b$t

en'd$n" $s that $t $s (s(a!!y nt$'eab!e t

the h()an ear s that $t $s a r$s9y )ethd.

&h$s )ethd wr9s by add$n" rand) n$ses

t the s$"na! the $n#r)at$n $s 'n'ea!

$ns$de a 'arr$er and s6read a'rss the

#re(en'y s6e'tr(). E'h h$d$n" $s yet

anther )ethd # h$d$n" $n#r)at$n $ns$de

an a(d$ #$!e. &h$s )ethd (ses the e'hes $n

s(nd #$!es $n rder t try and h$de the

$n#r)at$n. By s$)6!y add$n" e7tra s(nd

t an e'h $n a(d$ #$!e $n#r)at$n 'an be

'n'ea!ed.

Instead # h$d$n" the d$re't $n#r)at$n, $#

we h$de $ts '$6her by (s$n" a ')6!e7

a!"r$th) the syste) 'an atta$n anther !ee!

# se'(r$ty. In )y wr9 I hae (sed

Internat$na! data en'ry6t$n a!"r$th) t

en'ry6t at sender and de'ry6t at re'e$er.

&he sender and re'e$er sh(!d share the

9ey as 6er the a!"r$th). In se't$n ;, I hae

'!ear!y )ent$ned hw IDEA $s wr9$n" and

hw )y 6r6sed ste" syste) $s wr9$n".

Page 4: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 4/11

 II. THE PROPOSED SYSTEM 

&he ent$re 6r'ess 'an be (nderstd by

re#err$n" the #!!w$n" three se't$ns. Here I

hae d$s'(ssed ab(t IDEA and the

e)bedd$n" 6r'ess.

IDEA Algorithm

&he IDEA '$6her was dee!6ed by (e$a

4a$ and ?a)es Massey $n 1++/. It was 'a!!ed

PES =Pr6sed En'ry6t$n Standard>. &he

ne7t year, a#ter s)e 'are#(! er$#$'at$n $t

was 'a!!ed IPES =I)6red PES>. Its na)e

was 'han"ed t IDEA $n 1++;. IDEA $s

 based n s)e $)6ress$e theret$'a!

#(ndat$ns and, a!th("h 'ry6tana!ys$s has

)ade s)e 6r"ress a"a$nst red('ed-r(nd

ar$ants, the a!"r$th) st$!! see)s strn". In

)y 6$n$n $t $s the best and )st se'(re

 b!'9 '$6her a!"r$th) aa$!ab!e t the

 6(b!$' at th$s t$)e. &he #(t(re # IDEA $s

nt '!ear. &here has been n r(sh t ad6t $t

as a re6!a'e)ent t DES, 6art!y be'a(se

 6e6!e are st$!! wa$t$n", t see hw we!! the

a!"r$th) #ares d(r$n" the ')$n" years #

'ry6tana!ys$s.

IDEA $s a b!'9 '$6her: $t 6erates n

 b$t 6!a$nte7t b!'9s. &he 9ey $s 1;8 b$ts

!n". &he sa)e a!"r$th) $s (sed #r bth

en'ry6t$n and de'ry6t$n. &he des$"n

 6h$!s6hy beh$nd the a!"r$th) $s three

a!"ebra$' 6erat$ns are (sed: a!! 'an be

eas$!y $)6!e)ented $n bth hardware and

s#tware ;G. &he 6erat$ns are* 2,

Add$t$n )d(! ;1  and M(!t$6!$'at$n

)d(! =;1  1>. &hese 6erat$ns 6erate

n 1 b$t s(b-b!'9s.

F$".1 re6resents an er$ew # IDEA. &he

-b$t data b!'9 $s d$$ded $nt #(r 1 b$t

s(b b!'9s* 1, ;,  and . &hese #(r

s(b b!'9s be')e the $n6(t t the #$rst

r(nd # the a!"r$th). &here are e$"ht

r(nds tta!. In ea'h r(nd the #(r s(b

 b!'9s are 2ed, added and )(!t$6!$ed

w$th ne anther and w$th 1-b$t s(b 9eys.

Between r(nds, the se'nd and th$rd s(b

 b!'9s are swa66ed. F$na!!y, the #(r s(b

 b!'9s are ')b$ned w$th #(r s(b 9eys $n

an (t6(t trans#r)at$n.

Page 5: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 5/11

F$".1 IDEA a!"r$th)

In ea'h r(nd the se(en'e # 'a!'(!at$ns $sas #!!ws*

1. M(!t$6!y 1 and the #$rst s(b 9ey J1.

;. Add ; and se'nd s(b 9ey J;.. Add and the th$rd s(b 9ey J.

. M(!t$6!y and the #(rth s(b 9ey J.5. 2 the res(!ts # ste6s 1 and .

. 2 the res(!ts # ste6s ; and .

0. M(!t$6!y the res(!ts # ste6 5 w$th the #$#th

S(b 9ey J5.8. Add the res(!ts # ste6s and 0.

+. M(!t$6!y the res(!ts # ste6 8 w$th the

s$7th  s(b 9ey J.

1/. Add the res(!ts # ste6s 0 and +.11. 2 the res(!ts # ste6s 1 and +.1;. 2 the res(!ts # ste6s and +.

1. 2 the res(!ts # ste6s ; and 1/.

1. 2 the res(!ts # ste6s and 1/.

&he (t6(t # the r(nd $s the #(r s(b

 b!'9s that are the res(!ts # ste6s 11, 1;, 1,

and 1. Swa6 the tw $nner b!'9s e7'e6t

#r the !ast r(nd and that $s the $n6(t t the

ne7t r(nd. A#ter the e$"hth r(nd, there $s a#$na! (t6(t trans#r)at$n*

1. M(!t$6!y 1 and the #$rst s(b 9ey J1.;. Add ; and se'nd s(b 9ey J;.

. Add and the th$rd s(b 9ey J.

. M(!t$6!y and the #(rth s(b 9ey J.

F$na!!y the #(r s(b b!'9s are reatta'hed t

 6rd('e the '$6her te7t. Creat$n" the s(b

9eys $s a!s easy. &he a!"r$th) (ses 5; #the) =s$7 #r ea'h # the e$"ht r(nds and

#(r )re #r the (t6(t trans#r)at$n.

F$rst, the 1;8-b$t 9ey $s d$$ded $nt e$"ht

1-b$t s(b 9eys. &hese are the #$rst e$"ht s(b9eys #r the a!"r$th) =the s$7 #r the #$rst

r(nd and the #$rst tw #r the se'ndr(nd>. &hen the 9ey $s rtated ;5 b$ts t the

!e#t and a"a$n d$$ded $nt e$"ht s(b 9eys.

&he #$rst #(r are (sed $n r(nd ;: the !ast#(r are (sed $n r(nd . &he 9ey $s rtated

anther ;5 b$ts t the !e#t #r the ne7t e$"ht

s(b 9eys, and s n (nt$! the end # the

a!"r$th). De'ry6t$n $s e7a't!y the sa)e,e7'e6t that the s(b 9eys are reersed and

s!$"ht!y d$##erent. &he de'ry6t$n s(b 9eys

are e$ther the add$t$e r )(!t$6!$'at$e$nerses # the en'ry6t$n s(b 9eys. Fr the

 6(r6se # IDEA, the a!! Ker s(b b!'9 $s

'ns$dered t re6resent ;1  L -1 #r)(!t$6!$'at$n )d(! ;1  1: th(s the

)(!t$6!$'at$e $nerse # / $s /G. Ca!'(!at$n"

these 9eys ta9es s)e d$n", b(t y( n!y

hae t d $t n'e #r ea'h de'ry6t$n 9ey.

&he E)bedd$n" Pr'ess

&he 'er $)a"e $s t be 'nerted t

 b$nary. &he 6r$ate $n#r)at$n $s t be

'nerted t b$nary. &hen $t sh(!d be

en'ry6ted by IDEA a!"r$th) t "et the

'$6her te7t. &he '$6her te7t 'an be e)bedded

Page 6: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 6/11

$nt the 'er $)a"e. &here are )any ways

# e)bedd$n". &he )st (s(a! way $s 4SB

=!east s$"n$#$'ant b$t> $nsert$n 1G. ne b$t #

the '$6her $s e)bedded $nt the 1st  b$t #

ea'h byte # the 'er $)a"e. In th$s 6a6er I

(sed a d$##erent a66ra'h. In the #$rst byte

the #$rst b$t 6s$t$n, $n the se'nd byte the

se'nd b$t 6s$t$n, $n the th$rd byte the

th$rd b$t 6s$t$n and s n t$!! the 8 th byte.

A"a$n $n the +th byte the #$rst b$t 6s$t$n, $n

the 1/th byte the se'nd b$t 6s$t$n and s

n t$!! the 1th byte. A"a$n $n the 10 th  byte

the 1st b$t 6s$t$n, $n the 18 th byte the ;nd b$t

 6s$t$n and s n. &h$s tr$'9 $s 'nt$n(ed

t$!! the end # the en'ry6ted data. Here ne

 6$nt we 'an nte $s the !en"th # the 'er

$)a"e sh(!d be 8 t$)es than the '$6her

data. A!s $# the !en"th # the '$6her data $s

!ess than 18th # the 'er $)a"e then Kers

are t be added t the '$6her t )a9e $ts

!en"th 18th # the 'er $)a"e. &he re'e$er

w$!! '!!e't the '$6her #r) the res6e't$e b$t

 6s$t$ns and de'ry6t $t t "et the a't(a!

$n#r)at$n. &he IDEA a!"r$th) (ses a

ery ')6!e7 'a!'(!at$n s $t w$!! be ery

d$##$'(!t #r the $ntr(der t ha'9 the data.

 III. ALGORITHMS 

Algorithm1 (Text in Image)

Ste61- Cnert the 'er $)a"e t b$nary

Ste6; Cnert the 6r$ate data t b$nary.

Ste6 Ma9e s(re that the !en"th # 'er

$)a"e $s e7a't!y 8 t$)es than that # the

 6r$ate data. I# the 'er $)a"e $s !ess than 8

t$)es, then a b$""er $)a"e 'an be ta9en, r

$# the !en"th # 6r$ate data $s !ess than 18th

# the 'er $)a"e than Keres 'an be

 6added.

Ste6 A66!y$n" IDEA a!"r$th) t

en'ry6t the 6r$ate data by (s$n" the 1;8-b$t

9ey. Nw we "t the '$6her.

Ste65 E)bed the '$6her $nt the 'er

$)a"e as d$s'(ssed $n se't$n II.

Ste6 Nw send the tta! $)a"e t re'e$er 

Ste60 2e'e$er '!!e'ts the b$ts #r) ea'h

 byte #r) the d$##erent b$t 6s$t$ns as he

9nws the 6s$t$ns and a66!$es the IDEA

a!"r$th) w$th the sa)e 1;8-b$t =as (sed by

sender> 9ey t de'ry6t and "et the h$dden

$n#r)at$n.

Page 7: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 7/11

Algorithm2 (Image in Image)

Ste61- Cnert the 'er $)a"e t b$nary

Ste6; Cnert the 6r$ate $)a"e t b$nary.

Ste6 Ma9e s(re that the !en"th # 'er

$)a"e $s e7a't!y 8 t$)es than that # the

 6r$ate $)a"e. I# the 'er $)a"e $s !ess than

8 t$)es then a b$""er $)a"e 'an be ta9en, r

$# the !en"th # 6r$ate $)a"e $s !ess than

18th # the 'er $)a"e than Keres 'an be

 6added.

Ste6 A66!y$n" IDEA a!"r$th) t

en'ry6t the 6r$ate $)a"e by (s$n" the 1;8-

 b$t 9ey. Nw we "t the '$6her.

Ste65 E)bed the '$6her $nt the 'er

$)a"e as d$s'(ssed $n se't$n II.

Ste6 Nw send the tta! $)a"e t re'e$er 

Ste60 2e'e$er '!!e'ts the b$ts #r) ea'h

 byte #r) the d$##erent b$t 6s$t$ns as he

9nws the 6s$t$ns and a66!$es the IDEA

a!"r$th) w$th the sa)e 1;8-b$t =as (sed by

sender> 9ey t de'ry6t and "et the h$dden

$)a"e.

 IV THE SECURITY OF THE SYSTEM 

&here are tw !ee!s # se'(r$ty $n th$s

 6r6sed ste" syste). F$rst!y the $ntr(der

'annt s(s6e't by see$n" the $)a"e that

there $s s)eth$n" h$dden $ns$de $t. I# at a!!

he s(s6e'ts then what are the b$t 6s$t$ns,

hw he w$!! $dent$#y. I# the b$t 6s$t$ns

$dent$#$ed hw he 'an "et the 9ey t de'ry6t

the '$6her. I# the $ntr(der w$!! try t ha'9 by

h$t and tr$a! )ethd he )ay ta9e years

t"ether.

V. EXPERIMENTAL RESULTS 

A!"r$th)1- F$".; re6resents hw the te7t $s

h$dden $ns$de the $)a"e. F$". re6resents the

trans)$tted $)a"e and #$". re6resents the

de'ry6t$n at the re'e$er.

Page 8: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 8/11

 

F$".; h$d$n" the te7t $n the $)a"e

&he 6r$ate te7t t be h$dden $s* we w$!!

)eet t)rrw at + AMO. &he 'er $)a"e

F$". &rans)$tted I)a"e=&e7t $s h$dden>

Page 9: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 9/11

F$". De'ry6t$n at the re'e$er 

A!"r$th);-F$".5 re6resents hw the 6r$ate

$)a"e $s h$dden $ns$de the 'er $)a"e.

F$".- re6resents the trans)$tted tta! $)a"e

and #$".0 re6resents the de'ry6t$n at the

re'e$er.

F$".5 h$d$n" # the $)a"e $ns$de the 'er

$)a"e

&he !e#t s$de $)a"e shwn $n #$".5 $s the

 6r$ate $)a"e t be h$dden $n s$de the r$"ht

s$de $)a"e.

Page 10: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 10/11

F$". &rans)$tted tta! I)a"e

F$".0 De'ry6t$n at the re'e$er 

VI COC!"#IO

• As we 'an bsere #r) the res(!ts

 bth the a!"r$ths wr9s ery #$ne.

# '(rse I hae bsered by ta9$n"

ther sa)6!es a!s.

• It 6r$des )(!t$6!e !ee!s #

se'(r$ty. I# at a!! the $ntr(der

s(s6e'ts $t $s ery ery d$##$'(!t #r

h$) t ha'9 the data.

• B(t the )a$n de)er$t $s the sender

and re'e$er sh(!d a"ree the b$t

$nsert$n 6s$t$ns and the 9ey. &he

$)a"e (a!$ty s!$"ht!y de"rades.

• &h$s 6r'ess 'an be e7tended t send

 6r$ate $)a"e $n 'er $)a"e.

• It 'an a!s be re#erred t de$se new

 6r'ess hw t send 6r$ate

data$)a"e $n a(d$ as we!! as $de.

 

Page 11: Image in image steganography

8/14/2019 Image in image steganography

http://slidepdf.com/reader/full/image-in-image-steganography 11/11

$E%E$ECE#

1G Mha))ad A!$ Ban$ (nes, A)an

?antan, A New Ste"an"ra6hy A66ra'h

#r I)a"e En'ry6t$n E7'han"e by (s$n" the

4SB $nsert$nO, I?CSNS Internat$na!

?(rna! # C)6(ter S'$en'e % Netwr9

Se'(r$ty, V! 8, N , ?(ne ;//8.

;G Antt$ Ha)a!anen, Matt$ &))$s9a and

?r)a S9ytta, .08 @$"ab$ts

I)6!e)entat$n # the IDEA Cry6t"ra6h$'

A!"r$th)O, 1;th  'n#eren'e n F$e!d

Pr"ra))ab!e 4"$' and A66!$'at$ns,

Mnt6e!!$er, Fran'e, Se6t ;//;.

G A!6hae$s Man"arae, In Art$'!e Jne-

H.r"GO Mar'h 18th ;//.

G M$rs!a Dbs$'e9, In Art$'!e Mdern

Cry6t"ra6hyO, CKe'9 &e'hn$'a! n$ers$ty

$n Pra"(e.

5G 2ss ?. Andersn, Fab$an A.P.

Pet$t'!as,

n &he 4$)$ts # ste"an"ra6hyO, IEEE

?(rna! # se!e'ted Areas $n '))(n$'at$n,

1=>, 0-81, May 1++8.