SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
DOI:10.5121/ijcsit.2014.6614 169
EXPERIMENTAL ANALYSIS OF MATCHING
TECHNIQUE OF STEGANOGRAPHY FOR GREYSCALE
AND COLOUR IMAGE
Khurrum Rahim Rashid#1
, Aqsa Rashid*2
, Nadeem Salamat#3
and Saad Missen#4
#1
Department of Electrical Engineering, NUSES FAST, Pakistan
#2,4
Department of CS&IT, Islamia University Bahawalpur, Pakistan
#3
Department of Mathematics & Statistics, Karakoram International University Gilgit,
Gilgit-Biltastan
ABSTRACT
Steganography and steganalysis are vital matter in information hiding. Steganography refers to the
technology of hiding data into digital media without depiction of any misgiving, while steganalysis is the
detection of the existence of steganography. In this paper, the impact of sequential matching method for
every possible location in pixel is analyzed experimentally. After matching the steganalysis is check by
image quality measures (IQM) and Statistics, Histogram Analysis and visual attack. This analysis provides
comprehensive study and understanding of basic matching technique and is helpful for those who want to
work in the field of image steganography.
KEYWORDS
Stagnography, Least significant bit, Matching, Statistical trial for comparison.
I. INTRODUCTION
Steganography has established significant attention during the last decade, in particular after
anecdotal news suspected that this tool was used by terrorist. Steganography [2, 3] inquire about
to make available a clandestine message control between two parties. The data that are passing on
through internet persistently have possibility of third individual nosy. So there should be some
criteria to keep information covert today as the current time is of digital contact. There are various
steganography technique and medium used for this purpose [1][4][5][8]. These methods are
gaining value due to the secret communication over the internet.
In sequential matching method, the pixel value is incremented or decremented to match the
message and pixel bit. The process of matching keep on until the length of the message bits
becomes zero. This can be applied on both the greyscale and colour image.
The paper is arranged as Section II describes the method of matching, Section III discuss the
steganalysis, section IV gives experimental results and discussion, section V describes conclusion
II. METHOD
Matching steps for matching LSB Stego-method are:
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
170
So that
Contain the message bits. It first takes the pixel of the image and its value. If
matching bit and are now the same, then nothing to be done, but if they are dissimilar
then increment or decrement in in such a way that the become the matching bit. This
process goes on even as is not zero.
Extracting steps for sequential matching Stego-method
The is the total number of pixels of supposed image. Run the loop in place of . This
is because the embedding is different from the retrieval process. We just recover the LSB value of
each pixel in and translate this to ASCII; the message will be understandable and in readable
format up to the point that the message was embedded, and will then come into view as claptrap
when we are see the LSBs of the image data. If we know the length of the message that was
embedded, then the loop will be ended when the length of message is completed and only the
message will be retrieved i.e., no gibberish will be seen at the end of the message.
III. STEGANALYSIS
This part deals with the steganalysis of the matching techniques. It is divided into three
subsections. First deals with Steganalysis by Image Quality measures [6], Histogram, second
deals with Steganalysis by Histogram Analysis and third is Steganalysis by Bit Planes Analysis
(Visual Attack).
Image Quality Measure
In the paper four most important and widely used Image quality measures [7, 9, 10, 11, 12]
namely MSE, PSNR, UIQI and SSIM are computed for steganalysis. Mean Square Error (MSE)
computes the perceived error. It is pixel value difference based quality measure. Peak Signal to
Noise Ratio (PSNR) [10] is inversely proportional to MSE. Less MSE gives High PSNR which is
the proof of the fact that image has good quality.
Universal Image Quality Index split the judgment of similarity between Cover Image (CI) and
Stego-Image (SI) into three comparisons: Luminance, Contrast and Structural Information.
SSIM estimates “Perceived change in structural information”. It computes the similarity between
two images of common size. Its mathematical definition is as:
The value of UIQI and SSIM varies between 1 and -1. Closer the highest positive value denotes
too much less change in two images and -1 shows totally mismatch. The UIQI and SSIM are
considered as more consistent and accurate than MSE and PSNR.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
171
A. Histogram Analysis
Each bin of the histogram represents the number of pixels, which have the value represented
by that bin. After LSB matching the local maxima of the histogram of images will decrease and
the local minima will increase. Figure 1 (a) is the histogram of cover image and (b) shows the
histogram of stego-image.
Fig.1 (a) Histogram of Cover Image (b) Histogram of Stego-image
For histogram analysis Jaccard measure, Correlation, Chi-square, Intersection and
Bhattacharya distance [6] are computed between the histogram of cover image and stego-image.
All these comparisons are performed on normalized histogram. The correlation value varies
between 1 and -1. Perfect match is 1 and total mismatch is -1. For Chi-square ideal value is 0 and
mismatch value is unbound, for intersection 1 is ideal matching value and 0 is mismatched value
and Bhattacharya distance gives 0 for the exact match and 1 for mismatch. When these
comparison matrices gives ideal values or values that are closer to ideal values then the change in
histogram is very least and this is the evidence for Stego-System to be a secure system.
B. Visual Attack
Figure 2 shows the concept of bit planes for the greyscale images. In image steganography
visual hit distinguish whether or not a hypothetical image has been subjected to LSB matching
steganography, the steganalyst will be looking to obtain a visual inconsistency that will
successfully point out signs of embedding. Figure 3 shows the possibility of matching sequence
and effect of matching sequence on the bit plan.
Fig.2 Bit Plan Concept
IV. EXPERIMENTAL RESULTS AND DISCUSSION
The first part of this section includes the experimental results and discussion for the greyscale
image and second part extend it for colour images.
Greyscale Images: First of all, we compare the perceptual impact of the image after hiding
secret information. Secondly, impact on the image by statistical measures is compared. Then
histogram analysis is performed and finally, visual attack by inspecting all bit plans of image is
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
172
performed. First of all, experiments are performed for the greyscale images. In the next example,
we extend our results for the colour images.
Fig 3 (a) is the original greyscale image, (b) is the histogram of the greyscale cover
image that shows the minimum and maximum pixel value respectively, present in cover image
and number of pixels having same colour and (c-j) are the bit plans of Cover image. Table I
shows the results of Steganalysis by IQM. Table II shows the results of Histogram analysis. Fig 5
shows the bit plans of 0th (most significant bit MSB) to 7th (least significant bit LSB) bit stego-
images.
Fig 3 (a) Cover Image (b) Histogram of Cover Image (c-j) Bit plan of Cover Image
Fig 4 (a-h) 0th
(MSB) to 7th
(LSB) Bit Stego-Images
TABLE I Result of iqm for Gray scale Images
QM 0th
Bit 1st
Bit 2nd
Bit 3rd
Bit 4th
Bit 5th
Bit 6th
Bit 7th
Bit
MSE
676.3378
1
181.9650
9 50.76132
12.6359
8 3.77189 1.21497 0.49875 0.49449
PSNR 19.8388825.53092 31.075476
37.1147
2 42.36521
47.2851
4 51.15346 51.18917
NCC 0.96769 0.99999 0.99999 0.99999 0.99999 1 1 1
UIQI 0.66737 0.93663 0.98135 0.99529 0.99859 0.99955 0.99964 0.999815
SSIM 0.66612 0.93646 0.98129 0.99529 0.99859 0.99955 0.99981 0.99992
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
173
TABLE II RESULT OF HISTOGRAM COMPARISON FOR GREYSCALE IMAGES
H-comp 0th
Bit 1st
Bit 2nd
Bit 3rd
Bit 4th
Bit 5th
Bit 6th
Bit 7th
Bit
Jaccard 0.95871 0.98901 0.99688
0.9992
2 0.99977 0.99993 0.99997 0.99997
Intersection 0.94437 0.97109 0.98207
0.9909
4 0.99485 0.99698 0.99797 0.99776
Correlation 0.70408 0.93818 0.98142
0.9952
9 0.99859 0.99955 0.99981 0.99981
Chi-square 2.75833 0.74162 0.20791
0.0517
7 0.01545 0.00498 0.00203 0.00204
Bhattachary
a 0.08158 0.04345 0.02321
0.0121
4 0.00694 0.00415 0.00277 0.00250
Figure 5 ( a-h) Bit plans of 0th
to 7th
Bit Stego-image
Colour Image: This section is extension of experimental results and discussion to colour images.
Fig 6 (a) is the original RGB cover image having 34,645 pixels in pixel data (b) is the histogram
of the RGB cover image that shows the minimum pixel value, maximum pixel value present in
cover image and maximum number of pixels having same colour.(c),(d) and (e) are the channel
based histogram of the RGB cover image. All the experimental results for RGB images are shown
after replacing 96064 bits of RGB cover image.Fig.7 (a-c) shows the RGB bit plan of colour
image of Fig 6 (a).
Fig 8(a-h) are the 0th
to 7th
bit stego-images. Fig 9 to Fig 16 is the 0th
to 7th
bit RGB Bit
plans of stego-images. Table III shows the result of IQM for colour image. Table IV shows the
result of histogram comparison.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
174
Fig 6 (a) Cover image (b) Histogram of Cover image(c-e) Channel Based Histogram of Cover image
Fig 7 (a-c) Bit plans of RGB channel of Cover Image
Fig 8 (a-h) 0th
to 7th
Bit Stego-images
TABLE III Result of Iqm for colour images
IQM 0th
Bit 1st
Bit 2nd
Bit 3rd
Bit 4th
Bit 5th
Bit 6th
Bit 7th
Bit
MSE
2687.5041
6
342.7982
9 50.06137 12.03452 3.43584 0.99917 0.46127 0.46088
PSNR 13.84529 22.56285 30.81184 37.51692
42.7459
9 48.03016
51.4936
5
51.5100
3
NCC 0.99246 0.99254 0.99259 0.99278 0.99954 1 1
UIQI 0.33915 0.83143 0.97505 0.99405 0.99829 0.99950 0.99977 0.99977
SSIM 0.34085 0.83208 0.97514 0.99407 0.99830 0.999507 0.99977 0.99977
TABLE IV Result of histogram comparison for colour images
H-comp 0th
Bit 1st
Bit 2nd
Bit 3rd
Bit 4th
Bit 5th
Bit 6th
Bit 7th
Bit
Jaccard 0.66618 0.92576 0.98811 0.99711 0.99917 0.99976 0.99989 0.99989
Intersection 0.99163 0.96342 0.97102 0.98079 0.98995 0.99455 0.99588 0.99544
Correlation 0.40984 0.83169 0.97349 0.99466 0.99836 0.99951 0.99781 0.99985
Chi-square 12.75833 2.89087 0.44306 0.10753 0.03067 0.00892 0.00412 0.00412
Bhattyacharya 0.20944 0.12181 0.05473 0.02694 0.01448 0.00764 0.00532 0.00534
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
175
Fig 9 (a-c) RGB Bit plans of 0th
Bit Stego-image
Fig 10 (a-c) RGB Bit plans of 1st
Bit Stego-image
Fig 11 (a-c) RGB Bit plans of 2nd
Bit Stego-image
Fig 12 (a-c) RGB Bit plans of 3rd
Bit Stego-image
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
176
Fig 13 (a-c) RGB Bit plans of 4th
Bit Stego-image
Fig 14 (a-c) RGB Bit plans of 5th
Bit Stego-image
Fig 15 (a-c) RGB Bit plans of 6th
Bit Stego-image
Fig 16 (a-c) RGB Bit plans of 7th
Bit Stego-image
Perceptual appearance of stego-images in first two bits 0th
bit and 2nd
bit is very poor. And
change in histogram is also at great extinct for those stego-images. However improvement occurs
after 4th
bit. Table I and III shows the results of MSE, PSNR, NCC, UIQI and SSIM for the
greyscale and colour images. The greater the value of MSE and lesser PSNR means that
perceived error is high. NCC, UIQI and SSIM closer to 1 means that perceived change in
structural information is very less and 1 means identical images. And Table V shows the change
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
177
in pixel value. This is least for 7th
bit and increases as move towards 0th
bit. All these results are
the answer of the question that Why data is hidden only in the LSB of the pixel.
TABLE V Change in value of pixel after matching
Bit Location Maximum Minimum
7th
(LSB)Bit Increment/Decrement by 1 No change
6th
Bit Increment/Decrement by 2 No change
5th
Bit Increment/Decrement by 4 No change
4th
Bit Increment/Decrement by 8 No change
3rd
Bit Increment/Decrement by 16 No change
2nd
Bit Increment/Decrement by 32 No change
1st
Bit Increment/Decrement by 64 No change
0th
(M
SB)Bit Increment/Decrement by 128 No change
V. CONCLUSION
Image LSB matching steganography for every bit of pixel is critically analyzed after inserting
message bits in all location of image bits. Perceptual appearance is poor in most three significant
bits and remaining are good. Steganalysis is very easy for most significant bits. Perfect results of
image quality methods require identical images. MSB of the image contain most important
information. So change to that will give poor results of image quality measure. However as we
move from MSB to LSB results becomes good. This paper also discusses the important quality
evaluation methods and attacks on LSB matching. This analysis could be very helpful for those
who want to work in the field of steganography.
REFERENCES
[1] N.F.Johnson, Sushil Jojadia George Mason University, “Exploring Steganography: Seeing the
Unseen”, (0018-916/98/$10.00©) 1998 IEEE
[2] R.Poornima, R.J.Iswarya, “An Overview of Digital Image Steganography”, International Journal of
Computer Science & Engineering Survey (Vol.4, No 1),February 2013
[3] T.Morkel, T.H.P.Eloff, M.S.Olivier, “An Overview of Image Steganography”, ICSA Research Group,
Department of Computer Science.
[4] Jammi Ashok, Y.Raju, S.Munishankaralak, K.Srinivas, Jammi Ashok, “Steganography: An
Overview”, et.01./International Journal of Engineering Science and Technology, (Vol.2(10)), 2010,
5985-5992
[5] Shikha Sharda, Sumit Budhiraja , “Image Steganography:A Review”, International Journal of
Emerging Technology and Advance Engineering (volume 3, Issue 1), January 2013
[6] V. Asha, P. Nagabhushan, N. U. Bhajantri, “Similarity Measures for Automatic Defect Detection on
Patterned Textures”, International Journal of Image Processing and Vision Sciences (IJIPVS)
Volume-1 Issue-1, 2012
[7] Rajkumar Yadav, “Analysis of Various Image Steganography Techniques Based Upon PSNR
Metric”, International Journal of P2P Network Trends and Technology- (Volume1, Issue2)- 2011,
ISSN: 2249-2615
[8] M. Pavani, S. Naganjaneyulu, C. Nagaraju, “ A Survey on LSB Based Steganography Methods”,
International Journal Of Engineering And Computer Science ISSN: 2319-7242 (Volume 2 Issue 8)
August, 2013 Page No. 2464-2467
[9] Ismail Avcibas, Bulent Sankur, Khalid Sayood, “Statistical Evaluation of Image Quality Measure”,
Journal of Electronic Imaging, 11(2), 206-223(April 2002)
[10] Zhou Wang, Member,Hamid R. Sheikh, “Image Quality Assessment: From Error Visibility to
Structural Similarity”, IEEE Transactions On Image Processing, (VOL. 13, NO. 4), APRIL 2004 1
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
178
[11] Yousra A. Y. Al. Najjar, Dr. D. C. Soong, “Comparison of image quality assessment: PSNR, HVS,
UIQI, SSIM”, IJSER, (Vol. 3, Issue8), August-2012. ISSN2229-5518
[12] Amhamed Saffor, Abdul Rahman Ramli, Kwan-Hoong Ng, “A Comparative Study Of Image
Compression Between Jpeg And Wavelet”, Malaysian Journal of Computer Science, (Vol. 14 No. 1),
June 2001, pp. 39-45.

More Related Content

What's hot

One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based patternijcsit
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed satIAESIJEECS
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueIJERA Editor
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPIJNSA Journal
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyIOSR Journals
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Akash Rawat
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplicationijcsit
 
Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...
Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...
Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...IJECEIAES
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 

What's hot (18)

F0343545
F0343545F0343545
F0343545
 
One dimensional vector based pattern
One dimensional vector based patternOne dimensional vector based pattern
One dimensional vector based pattern
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
 
D0341829
D0341829D0341829
D0341829
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression TechniqueFuzzy Type Image Fusion Using SPIHT Image Compression Technique
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
 
RC4 Technique in Visual Cryptography
RC4 Technique in Visual CryptographyRC4 Technique in Visual Cryptography
RC4 Technique in Visual Cryptography
 
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAPA CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
 
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix MultiplicationEncryption-Decryption RGB Color Image Using Matrix Multiplication
Encryption-Decryption RGB Color Image Using Matrix Multiplication
 
Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...
Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...
Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 

Viewers also liked

The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...ijcsit
 
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...
R ESEARCH ON  D ECISION  M AKING  R EGARDING  H IGH - BUSINESS - STRATEGY  C ...R ESEARCH ON  D ECISION  M AKING  R EGARDING  H IGH - BUSINESS - STRATEGY  C ...
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...ijcsit
 
Vyhledávače zboží 2014: Pricemania
Vyhledávače zboží 2014: PricemaniaVyhledávače zboží 2014: Pricemania
Vyhledávače zboží 2014: PricemaniaBESTETO
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant eventijscai
 
Design and implementation of a personal super Computer
Design and implementation of a personal super ComputerDesign and implementation of a personal super Computer
Design and implementation of a personal super Computerijcsit
 
Handover management scheme in LTE FEMTOCELL networks
Handover management scheme in LTE FEMTOCELL networksHandover management scheme in LTE FEMTOCELL networks
Handover management scheme in LTE FEMTOCELL networksijcsit
 
Top 7 logistics coordinator interview questions answers
Top 7 logistics coordinator interview questions answersTop 7 logistics coordinator interview questions answers
Top 7 logistics coordinator interview questions answersjob-interview-questions
 
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
T OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATELT OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATEL
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATELijcsit
 
Top 7 legal secretary interview questions answers
Top 7 legal secretary interview questions answersTop 7 legal secretary interview questions answers
Top 7 legal secretary interview questions answersjob-interview-questions
 
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKSTWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKSijcsit
 

Viewers also liked (10)

The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...The Impact of Frequent Use Email When Creating Account at the Websites on the...
The Impact of Frequent Use Email When Creating Account at the Websites on the...
 
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...
R ESEARCH ON  D ECISION  M AKING  R EGARDING  H IGH - BUSINESS - STRATEGY  C ...R ESEARCH ON  D ECISION  M AKING  R EGARDING  H IGH - BUSINESS - STRATEGY  C ...
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...
 
Vyhledávače zboží 2014: Pricemania
Vyhledávače zboží 2014: PricemaniaVyhledávače zboží 2014: Pricemania
Vyhledávače zboží 2014: Pricemania
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant event
 
Design and implementation of a personal super Computer
Design and implementation of a personal super ComputerDesign and implementation of a personal super Computer
Design and implementation of a personal super Computer
 
Handover management scheme in LTE FEMTOCELL networks
Handover management scheme in LTE FEMTOCELL networksHandover management scheme in LTE FEMTOCELL networks
Handover management scheme in LTE FEMTOCELL networks
 
Top 7 logistics coordinator interview questions answers
Top 7 logistics coordinator interview questions answersTop 7 logistics coordinator interview questions answers
Top 7 logistics coordinator interview questions answers
 
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
T OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATELT OWARDS A  S YSTEM  D YNAMICS  M ODELING  M E- THOD B ASED ON  DEMATEL
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
 
Top 7 legal secretary interview questions answers
Top 7 legal secretary interview questions answersTop 7 legal secretary interview questions answers
Top 7 legal secretary interview questions answers
 
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKSTWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
 

Similar to Experimental analysis of matching technique of steganography for greyscale and colour image

Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence MatrixSteganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence MatrixCSCJournals
 
Quick Identification of Stego Signatures in Images Using Suspicion Value (Sp...
Quick Identification of Stego Signatures in Images Using  Suspicion Value (Sp...Quick Identification of Stego Signatures in Images Using  Suspicion Value (Sp...
Quick Identification of Stego Signatures in Images Using Suspicion Value (Sp...IOSR Journals
 
Identification of Steganographic Signatures in Stego Images Generated By Dis...
Identification of Steganographic Signatures in Stego Images  Generated By Dis...Identification of Steganographic Signatures in Stego Images  Generated By Dis...
Identification of Steganographic Signatures in Stego Images Generated By Dis...IOSR Journals
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREAIRCC Publishing Corporation
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm basedIJNSA Journal
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014ijcsbi
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...IJECEIAES
 
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...ijsc
 
4 image steganography combined with des encryption pre processing
4 image steganography combined with des encryption pre processing4 image steganography combined with des encryption pre processing
4 image steganography combined with des encryption pre processingAlok Padole
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement ijsc
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET Journal
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Influence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingInfluence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingiaemedu
 

Similar to Experimental analysis of matching technique of steganography for greyscale and colour image (20)

Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence MatrixSteganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
 
Quick Identification of Stego Signatures in Images Using Suspicion Value (Sp...
Quick Identification of Stego Signatures in Images Using  Suspicion Value (Sp...Quick Identification of Stego Signatures in Images Using  Suspicion Value (Sp...
Quick Identification of Stego Signatures in Images Using Suspicion Value (Sp...
 
Identification of Steganographic Signatures in Stego Images Generated By Dis...
Identification of Steganographic Signatures in Stego Images  Generated By Dis...Identification of Steganographic Signatures in Stego Images  Generated By Dis...
Identification of Steganographic Signatures in Stego Images Generated By Dis...
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATUREMINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
 
A new image steganography algorithm based
A new image steganography algorithm basedA new image steganography algorithm based
A new image steganography algorithm based
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...
 
4 image steganography combined with des encryption pre processing
4 image steganography combined with des encryption pre processing4 image steganography combined with des encryption pre processing
4 image steganography combined with des encryption pre processing
 
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement  Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
 
L045056469
L045056469L045056469
L045056469
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Influence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processingInfluence of local segmentation in the context of digital image processing
Influence of local segmentation in the context of digital image processing
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Experimental analysis of matching technique of steganography for greyscale and colour image

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 DOI:10.5121/ijcsit.2014.6614 169 EXPERIMENTAL ANALYSIS OF MATCHING TECHNIQUE OF STEGANOGRAPHY FOR GREYSCALE AND COLOUR IMAGE Khurrum Rahim Rashid#1 , Aqsa Rashid*2 , Nadeem Salamat#3 and Saad Missen#4 #1 Department of Electrical Engineering, NUSES FAST, Pakistan #2,4 Department of CS&IT, Islamia University Bahawalpur, Pakistan #3 Department of Mathematics & Statistics, Karakoram International University Gilgit, Gilgit-Biltastan ABSTRACT Steganography and steganalysis are vital matter in information hiding. Steganography refers to the technology of hiding data into digital media without depiction of any misgiving, while steganalysis is the detection of the existence of steganography. In this paper, the impact of sequential matching method for every possible location in pixel is analyzed experimentally. After matching the steganalysis is check by image quality measures (IQM) and Statistics, Histogram Analysis and visual attack. This analysis provides comprehensive study and understanding of basic matching technique and is helpful for those who want to work in the field of image steganography. KEYWORDS Stagnography, Least significant bit, Matching, Statistical trial for comparison. I. INTRODUCTION Steganography has established significant attention during the last decade, in particular after anecdotal news suspected that this tool was used by terrorist. Steganography [2, 3] inquire about to make available a clandestine message control between two parties. The data that are passing on through internet persistently have possibility of third individual nosy. So there should be some criteria to keep information covert today as the current time is of digital contact. There are various steganography technique and medium used for this purpose [1][4][5][8]. These methods are gaining value due to the secret communication over the internet. In sequential matching method, the pixel value is incremented or decremented to match the message and pixel bit. The process of matching keep on until the length of the message bits becomes zero. This can be applied on both the greyscale and colour image. The paper is arranged as Section II describes the method of matching, Section III discuss the steganalysis, section IV gives experimental results and discussion, section V describes conclusion II. METHOD Matching steps for matching LSB Stego-method are:
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 170 So that Contain the message bits. It first takes the pixel of the image and its value. If matching bit and are now the same, then nothing to be done, but if they are dissimilar then increment or decrement in in such a way that the become the matching bit. This process goes on even as is not zero. Extracting steps for sequential matching Stego-method The is the total number of pixels of supposed image. Run the loop in place of . This is because the embedding is different from the retrieval process. We just recover the LSB value of each pixel in and translate this to ASCII; the message will be understandable and in readable format up to the point that the message was embedded, and will then come into view as claptrap when we are see the LSBs of the image data. If we know the length of the message that was embedded, then the loop will be ended when the length of message is completed and only the message will be retrieved i.e., no gibberish will be seen at the end of the message. III. STEGANALYSIS This part deals with the steganalysis of the matching techniques. It is divided into three subsections. First deals with Steganalysis by Image Quality measures [6], Histogram, second deals with Steganalysis by Histogram Analysis and third is Steganalysis by Bit Planes Analysis (Visual Attack). Image Quality Measure In the paper four most important and widely used Image quality measures [7, 9, 10, 11, 12] namely MSE, PSNR, UIQI and SSIM are computed for steganalysis. Mean Square Error (MSE) computes the perceived error. It is pixel value difference based quality measure. Peak Signal to Noise Ratio (PSNR) [10] is inversely proportional to MSE. Less MSE gives High PSNR which is the proof of the fact that image has good quality. Universal Image Quality Index split the judgment of similarity between Cover Image (CI) and Stego-Image (SI) into three comparisons: Luminance, Contrast and Structural Information. SSIM estimates “Perceived change in structural information”. It computes the similarity between two images of common size. Its mathematical definition is as: The value of UIQI and SSIM varies between 1 and -1. Closer the highest positive value denotes too much less change in two images and -1 shows totally mismatch. The UIQI and SSIM are considered as more consistent and accurate than MSE and PSNR.
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 171 A. Histogram Analysis Each bin of the histogram represents the number of pixels, which have the value represented by that bin. After LSB matching the local maxima of the histogram of images will decrease and the local minima will increase. Figure 1 (a) is the histogram of cover image and (b) shows the histogram of stego-image. Fig.1 (a) Histogram of Cover Image (b) Histogram of Stego-image For histogram analysis Jaccard measure, Correlation, Chi-square, Intersection and Bhattacharya distance [6] are computed between the histogram of cover image and stego-image. All these comparisons are performed on normalized histogram. The correlation value varies between 1 and -1. Perfect match is 1 and total mismatch is -1. For Chi-square ideal value is 0 and mismatch value is unbound, for intersection 1 is ideal matching value and 0 is mismatched value and Bhattacharya distance gives 0 for the exact match and 1 for mismatch. When these comparison matrices gives ideal values or values that are closer to ideal values then the change in histogram is very least and this is the evidence for Stego-System to be a secure system. B. Visual Attack Figure 2 shows the concept of bit planes for the greyscale images. In image steganography visual hit distinguish whether or not a hypothetical image has been subjected to LSB matching steganography, the steganalyst will be looking to obtain a visual inconsistency that will successfully point out signs of embedding. Figure 3 shows the possibility of matching sequence and effect of matching sequence on the bit plan. Fig.2 Bit Plan Concept IV. EXPERIMENTAL RESULTS AND DISCUSSION The first part of this section includes the experimental results and discussion for the greyscale image and second part extend it for colour images. Greyscale Images: First of all, we compare the perceptual impact of the image after hiding secret information. Secondly, impact on the image by statistical measures is compared. Then histogram analysis is performed and finally, visual attack by inspecting all bit plans of image is
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 172 performed. First of all, experiments are performed for the greyscale images. In the next example, we extend our results for the colour images. Fig 3 (a) is the original greyscale image, (b) is the histogram of the greyscale cover image that shows the minimum and maximum pixel value respectively, present in cover image and number of pixels having same colour and (c-j) are the bit plans of Cover image. Table I shows the results of Steganalysis by IQM. Table II shows the results of Histogram analysis. Fig 5 shows the bit plans of 0th (most significant bit MSB) to 7th (least significant bit LSB) bit stego- images. Fig 3 (a) Cover Image (b) Histogram of Cover Image (c-j) Bit plan of Cover Image Fig 4 (a-h) 0th (MSB) to 7th (LSB) Bit Stego-Images TABLE I Result of iqm for Gray scale Images QM 0th Bit 1st Bit 2nd Bit 3rd Bit 4th Bit 5th Bit 6th Bit 7th Bit MSE 676.3378 1 181.9650 9 50.76132 12.6359 8 3.77189 1.21497 0.49875 0.49449 PSNR 19.8388825.53092 31.075476 37.1147 2 42.36521 47.2851 4 51.15346 51.18917 NCC 0.96769 0.99999 0.99999 0.99999 0.99999 1 1 1 UIQI 0.66737 0.93663 0.98135 0.99529 0.99859 0.99955 0.99964 0.999815 SSIM 0.66612 0.93646 0.98129 0.99529 0.99859 0.99955 0.99981 0.99992
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 173 TABLE II RESULT OF HISTOGRAM COMPARISON FOR GREYSCALE IMAGES H-comp 0th Bit 1st Bit 2nd Bit 3rd Bit 4th Bit 5th Bit 6th Bit 7th Bit Jaccard 0.95871 0.98901 0.99688 0.9992 2 0.99977 0.99993 0.99997 0.99997 Intersection 0.94437 0.97109 0.98207 0.9909 4 0.99485 0.99698 0.99797 0.99776 Correlation 0.70408 0.93818 0.98142 0.9952 9 0.99859 0.99955 0.99981 0.99981 Chi-square 2.75833 0.74162 0.20791 0.0517 7 0.01545 0.00498 0.00203 0.00204 Bhattachary a 0.08158 0.04345 0.02321 0.0121 4 0.00694 0.00415 0.00277 0.00250 Figure 5 ( a-h) Bit plans of 0th to 7th Bit Stego-image Colour Image: This section is extension of experimental results and discussion to colour images. Fig 6 (a) is the original RGB cover image having 34,645 pixels in pixel data (b) is the histogram of the RGB cover image that shows the minimum pixel value, maximum pixel value present in cover image and maximum number of pixels having same colour.(c),(d) and (e) are the channel based histogram of the RGB cover image. All the experimental results for RGB images are shown after replacing 96064 bits of RGB cover image.Fig.7 (a-c) shows the RGB bit plan of colour image of Fig 6 (a). Fig 8(a-h) are the 0th to 7th bit stego-images. Fig 9 to Fig 16 is the 0th to 7th bit RGB Bit plans of stego-images. Table III shows the result of IQM for colour image. Table IV shows the result of histogram comparison.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 174 Fig 6 (a) Cover image (b) Histogram of Cover image(c-e) Channel Based Histogram of Cover image Fig 7 (a-c) Bit plans of RGB channel of Cover Image Fig 8 (a-h) 0th to 7th Bit Stego-images TABLE III Result of Iqm for colour images IQM 0th Bit 1st Bit 2nd Bit 3rd Bit 4th Bit 5th Bit 6th Bit 7th Bit MSE 2687.5041 6 342.7982 9 50.06137 12.03452 3.43584 0.99917 0.46127 0.46088 PSNR 13.84529 22.56285 30.81184 37.51692 42.7459 9 48.03016 51.4936 5 51.5100 3 NCC 0.99246 0.99254 0.99259 0.99278 0.99954 1 1 UIQI 0.33915 0.83143 0.97505 0.99405 0.99829 0.99950 0.99977 0.99977 SSIM 0.34085 0.83208 0.97514 0.99407 0.99830 0.999507 0.99977 0.99977 TABLE IV Result of histogram comparison for colour images H-comp 0th Bit 1st Bit 2nd Bit 3rd Bit 4th Bit 5th Bit 6th Bit 7th Bit Jaccard 0.66618 0.92576 0.98811 0.99711 0.99917 0.99976 0.99989 0.99989 Intersection 0.99163 0.96342 0.97102 0.98079 0.98995 0.99455 0.99588 0.99544 Correlation 0.40984 0.83169 0.97349 0.99466 0.99836 0.99951 0.99781 0.99985 Chi-square 12.75833 2.89087 0.44306 0.10753 0.03067 0.00892 0.00412 0.00412 Bhattyacharya 0.20944 0.12181 0.05473 0.02694 0.01448 0.00764 0.00532 0.00534
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 175 Fig 9 (a-c) RGB Bit plans of 0th Bit Stego-image Fig 10 (a-c) RGB Bit plans of 1st Bit Stego-image Fig 11 (a-c) RGB Bit plans of 2nd Bit Stego-image Fig 12 (a-c) RGB Bit plans of 3rd Bit Stego-image
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 176 Fig 13 (a-c) RGB Bit plans of 4th Bit Stego-image Fig 14 (a-c) RGB Bit plans of 5th Bit Stego-image Fig 15 (a-c) RGB Bit plans of 6th Bit Stego-image Fig 16 (a-c) RGB Bit plans of 7th Bit Stego-image Perceptual appearance of stego-images in first two bits 0th bit and 2nd bit is very poor. And change in histogram is also at great extinct for those stego-images. However improvement occurs after 4th bit. Table I and III shows the results of MSE, PSNR, NCC, UIQI and SSIM for the greyscale and colour images. The greater the value of MSE and lesser PSNR means that perceived error is high. NCC, UIQI and SSIM closer to 1 means that perceived change in structural information is very less and 1 means identical images. And Table V shows the change
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 177 in pixel value. This is least for 7th bit and increases as move towards 0th bit. All these results are the answer of the question that Why data is hidden only in the LSB of the pixel. TABLE V Change in value of pixel after matching Bit Location Maximum Minimum 7th (LSB)Bit Increment/Decrement by 1 No change 6th Bit Increment/Decrement by 2 No change 5th Bit Increment/Decrement by 4 No change 4th Bit Increment/Decrement by 8 No change 3rd Bit Increment/Decrement by 16 No change 2nd Bit Increment/Decrement by 32 No change 1st Bit Increment/Decrement by 64 No change 0th (M SB)Bit Increment/Decrement by 128 No change V. CONCLUSION Image LSB matching steganography for every bit of pixel is critically analyzed after inserting message bits in all location of image bits. Perceptual appearance is poor in most three significant bits and remaining are good. Steganalysis is very easy for most significant bits. Perfect results of image quality methods require identical images. MSB of the image contain most important information. So change to that will give poor results of image quality measure. However as we move from MSB to LSB results becomes good. This paper also discusses the important quality evaluation methods and attacks on LSB matching. This analysis could be very helpful for those who want to work in the field of steganography. REFERENCES [1] N.F.Johnson, Sushil Jojadia George Mason University, “Exploring Steganography: Seeing the Unseen”, (0018-916/98/$10.00©) 1998 IEEE [2] R.Poornima, R.J.Iswarya, “An Overview of Digital Image Steganography”, International Journal of Computer Science & Engineering Survey (Vol.4, No 1),February 2013 [3] T.Morkel, T.H.P.Eloff, M.S.Olivier, “An Overview of Image Steganography”, ICSA Research Group, Department of Computer Science. [4] Jammi Ashok, Y.Raju, S.Munishankaralak, K.Srinivas, Jammi Ashok, “Steganography: An Overview”, et.01./International Journal of Engineering Science and Technology, (Vol.2(10)), 2010, 5985-5992 [5] Shikha Sharda, Sumit Budhiraja , “Image Steganography:A Review”, International Journal of Emerging Technology and Advance Engineering (volume 3, Issue 1), January 2013 [6] V. Asha, P. Nagabhushan, N. U. Bhajantri, “Similarity Measures for Automatic Defect Detection on Patterned Textures”, International Journal of Image Processing and Vision Sciences (IJIPVS) Volume-1 Issue-1, 2012 [7] Rajkumar Yadav, “Analysis of Various Image Steganography Techniques Based Upon PSNR Metric”, International Journal of P2P Network Trends and Technology- (Volume1, Issue2)- 2011, ISSN: 2249-2615 [8] M. Pavani, S. Naganjaneyulu, C. Nagaraju, “ A Survey on LSB Based Steganography Methods”, International Journal Of Engineering And Computer Science ISSN: 2319-7242 (Volume 2 Issue 8) August, 2013 Page No. 2464-2467 [9] Ismail Avcibas, Bulent Sankur, Khalid Sayood, “Statistical Evaluation of Image Quality Measure”, Journal of Electronic Imaging, 11(2), 206-223(April 2002) [10] Zhou Wang, Member,Hamid R. Sheikh, “Image Quality Assessment: From Error Visibility to Structural Similarity”, IEEE Transactions On Image Processing, (VOL. 13, NO. 4), APRIL 2004 1
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 178 [11] Yousra A. Y. Al. Najjar, Dr. D. C. Soong, “Comparison of image quality assessment: PSNR, HVS, UIQI, SSIM”, IJSER, (Vol. 3, Issue8), August-2012. ISSN2229-5518 [12] Amhamed Saffor, Abdul Rahman Ramli, Kwan-Hoong Ng, “A Comparative Study Of Image Compression Between Jpeg And Wavelet”, Malaysian Journal of Computer Science, (Vol. 14 No. 1), June 2001, pp. 39-45.