SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Engineering Research and Development
ISSN: 2278-067X, Volume 1, Issue 12 (July 2012), PP.21-26
www.ijerd.com

              A Novel method of Reducing Additive Distortion in
                 Steganography with Embedding Operation
                                               CH.Sairam1, B.Lakshmi2
                                           1
                                             Dept of CSE, AME, Palavncha, India,
                                    2
                                        Asst.prof, Dept of CSE, AME, Palavncha, India


Abstract––This paper proposes a new methodology for reducing additive distortion in steganography with embedding
operation. In this paper it is planned to introduce a method that embed 2 bits information in a pixel and alter one bit from
one bit plane but the message does not necessarily place in the least significant bit of pixel and second less significant bit
plane and fourth less significant bit plane can also host the massage. In this approach we used a novel syndrome-coding
scheme based on dual convolution codes equipped with the Viterbi algorithm. This fast and very versatile solution
achieves state-of-the-art results in steganographic applications while having linear time and space complexity w.r.t. the
number of cover elements. Security is provided by applying DES (Data Encryption Standard) for encryption and
decryption of embedded message. Practical merit of this approach is validated by constructing and testing adaptive
embedding schemes for digital images in raster and transform domains. Most current coding schemes used in
steganography (matrix embedding, wet paper codes, etc.) and many new ones can be implemented using this framework.

Keywords––STEGO, VITERBI, DES

                                                 I.      INTRODUCTION
           Steganography is the art and science of writing hidden messages in such a way that no one, apart from the Sender
and intended recipient, suspects the existence of the message, a form of security through obscurity[1]. It is often thought that
communications may be secured by encrypting the trac, but this has rarely been adequate in practice. Neas the Tactician, and
other classical Writers, concentrated on methods for hiding messages rather than for enciphering them [2]. There exist two
mainstream approaches to steganography in empirical covers, such as digital media objects steganography designed to
preserve a chosen cover model and steganography minimizing a heuristically-defined embedding distortion today’s least
detectable steganographic schemes for digital images [3]–[6] were designed using this principle. Moreover, when the
distortion is defined as a norm between feature vectors extracted from cover and stego objects, minimizing distortion
becomes tightly connected with model preservation insofar the features can be considered as a low-dimensional model of
covers. This line of reasoning already appeared in [6] and [7] and was further developed in [8]. With the exception of [8],
steganographers work with additive distortion functions obtained as a sum of single-letter distortions. A well-known
example is matrix embedding where the sender minimizes the total number of embedding changes. Near-optimal coding
schemes for this problem appeared in [9] and [10], together with other clever constructions and extensions [11]–[16]. In this
paper it is planned to introduce a method that embed 2 bits information in a pixel and alter one bit from one bit plane but the
message does not necessarily place in the least significant bit of pixel and second less significant bit plane and fourth less
significant bit plane can also host the massage. Since in our method for embedding two bits message we alter just one bit
plane, fewer pixels would be manipulated during embedding message in an image and it is expected for the steganalysis
algorithm to have more difficulty detecting the covert communication. It is clear that in return complexity of the syst em
would increase. In our method there are only three ways that a pixel is allowed to be changed:
     1. Its least significant Bit would alter (So the gray level of the pixel would increased or decreased by one level)
     2. The second less significant bit plane would alter (So the gray level of the pixel would increase or decrease by two
           levels)
     3. The fourth less significant bit plane would alter (So the gray level of the pixel would increase or decrease by eight
           levels).

     For executing the process the code is written in JAVA language. And Simulation is done in MATLAB (for checking
Histogram of Original & Stegno image). The paper is organized as fallows. In section II we described about the
implementation process where in which how the data is taken and embedded and including decryption process is explained.
And in section III about the experimental results showing all the pictorial view of all the results. In section IV analysis is
done on this process and comparison graph is also plotted. And fallowed by conclusion section.

                                               II.    IMPLEMENTATION
           Hiding information in text is historically the most important method of steganography. An obvious method was to
hide a secret message in every nth letter of every word of a text message. It is only since the beginning of the Internet and all
the different digital file formats that is has decreased in importance. Text steganography using digital files is not used very
often since text files have a very small amount of redundant data. To hide information in audio files similar techniques are
used as for image files. One different technique unique to audio steganography is masking, which exploits the properties of

                                                              21
A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation

the human ear to hide information unnoticeably. A faint, but audible, sound becomes inaudible in the presence of another
louder audible sound. This property creates a channel in which to hide information. Although nearly equal to images in
steganography potential, the larger size of meaningful audio files makes them less popular to use than images. The term
protocol steganography refers to the technique of embedding information within messages and network control protocols
used in network transmission
In this we have 2 modules
A) Steg module
B) UnSteg module

Steg Module:
         In this module User need to write any secret information in Text area provided and need to select an Image file to
which User wants to append the Secret Information Text. After Selecting the Image the processing of adding Secret
Information to Image file takes place. In Steg Module only the Secret Text Information and Image to which Secret Text
Information will be selected and the remaining process go on based on the pixels of image and Text given.

UnSteg Module:
           In UnSteg module the Encrypted Image will be selected and Steganography Application will start decrypting it
with each and every pixel of the Image and displays the output i.e. Secret Text Information. UnSteg module will be
accepting only the Image which has the hidden text message in it. After decrypting the Image the Secret Text Information
will be displayed from the Image by UnSteg Module.

Data flow diagram




                                          Figure 1: The overall implementation flow

           Here in this process take the input image that is to be watermarked. The Input Module is designed as such a way
that the proposed system must be capable of handling any type of data formats, such as if the user wishes to hide any image
format then it must be compatible with all usual image formats such as jpg, gif, bmp, it must be also compatible with video
formats such as avi, flv, wmf etc.And also it must be compatible with various document formats, so that the user can be able
to use any formats to hide the secret data.

          The next process is watermarking. Watermarking is a technology for embedding various types of information in
digital content. In general, information for protecting copyrights and proving the validity of data is embedded as a
watermark. Watermarked content can prove its origin, thereby protecting the data. Next is encrypting the data. In this module
we encrypt the data embedded image. The purpose of authenticator watermark of a block is invariant in the watermark
embedding process; hence the watermark can be extracted without referring to the original content .The encryption and
decryption techniques are used in this module. In applications, the method is required to be made robust so that embedded
message can be deducted easily, even when stego images are slightly modified. In digital communications, information is
transmitted bit-by-bit, i.e. as binary signaling. Larger the pulse size of the symbol higher is the probability of detection.
Improvements of performance is due to the fact that for fewer symbols to hide we use more locations per symbol. Each
symbol is represented by a pattern of binary bits.

          Next method is we flip an edge pixel in binary images is equivalent to shifting the edge location horizontally one
pixel and vertically one pixel. A horizontal edge exists if there is a transition between two neighboring pixels vertically and a
vertical edge exists if there is a transition between two neighboring pixels horizontally. We use spread spectrum watermark
morphological content. The watermarked content is obtained by computing the inverse for the main processing block to
reconstruct its candidate pixels. Use this module we going to see the original and watermarked content

                                                              22
A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation

                      III.      EXPERIMENTAL RESULTS




                   Figure1: Figure showing the screen of login page of user




            Figures2: Figure showing the user entering the username and password.




                      Figure 3: User interface picture showing the labels




                       Figure 4: Inserting an input data for embedding




                                             23
A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation




           Figure 5: Entering the input message to be embedded into the input data and encrypting the final data




           Figure 6: Entering the input message to be embedded into the input data and encrypting the final data




                                          Figure 7: Final page after encryption




                                Figure8: Entering the password for decryption by receiver.

                       IV.       SIMULATION AND STEGANALYSIS RESULTS
         We will consider text-in-image embedding to demonstrate the simulation results, but the method can be used for
other messages like binary images too, which was already analysized and given in IETE Technical Review. Fig 3 Output
Results

Visual Precept ion
         For any steganography based secure system, the perception of steganos should be as cover image itself so that one
cannot differentiate them and detect the existence of embedded message. From fig 3, the cover image, processed cover
image and stego images look similar and one is not able to distinguish them visually.
                                                           24
A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation

Difference Analysis
          The “difference-images “obtained by taking the difference between cover, processed cover and stego images are
not visible. For making the difference visible in “difference-images “ for visual interpretation, we first increase differences
by multiplication of weight factor and then revert the values to get the strengthened “difference-images”. The strengthened
difference-images obtained are shown in fig 4. From analysis of these “difference-images “, on could not say that the
changes are either due to cover processing or message embedding and hence we can say that the method is safe from known
cover-stego attack.

Distortion Analysis
         Distortion analysis of stego images is carried out by studying distortion / similarity messages statistically. There
are many methods for measuring distortion that can be used for distortion analysis. Distortion between two different images
is measured by considering Mean Square Error (MSE), Mean Absolute Error (MAE) or Histogram Similarity (HS).

Depth Vs Distortion Analysis
          Distortion occurred in different steganos is required by varying the depth of hiding for embedding information in
cover image. The relation between depth of hiding used and distortion occurred in the stego images is shown in Fig 7. That
depth of hiding within some LSB region is most suitable for message embedding as the distortion is very small in this region.
As the depth of hiding increases beyond preferable region, the distortion becomes noticeable and unsuitable for message
hiding.




                               DISTORTION
                            (MAE)




                                                                  DEPTH OF HIDING (D)

                                         Fig.9.Depth Vs Distortion Analysis Security

           A method, SBIPM, for providing the security of our important information has been proposed in this paper which
is based on the techniques of signal processing, cryptography, and steganography. The security of information has been
strengthened by applying scanning, coding, and encryption, cover processing and embedding techniques in the method.
Reshaping step of the method provides robustness for detecting message correctly in such situation when stego image is
distorted. The method developed is safe from various attacks. Simulation and steganalysis results shown in this paper shows
that one will not be able to distinguish between cover and stego images.

                                                  V.         CONCLUSION
          Thus we conclude that the strength of security achieved is very high and unauthorized receiver will not be able to
get back the original message using exhaustive without the knowledge of key parameters. Digital Steganography is
interesting field and growing rapidly for information hiding in the area of information security. It has a vital role in defense
as well as civil applications. In future we will more of secure systems based on this technology.

                                                       REFERENCES
[1].      Petitcolas, FAP; Anderson RJ; Kuhn MG (1999). Information hiding a survey Proceedings of the IEEE (special issue) 87 (7):
          1062–78. . Retrieved 2008-09-02.
[2].      A. Tacticus, How to survive under siege / Aineias the Tactician, pp. 84{90, 183{193. Clarendon ancient history series,Oxford,
          England: Clarendon Press, 1990, ISBN 0-19-814744-9,translated with introduction and commentary by David White head
[3].      Y. Kim, Z. Duric, and D. Richards, “Modified matrix encoding technique for minimal istortion steganography,” in Proc. 8th Int.
          Workshop Inf. Hiding,J.L.Camenisch,C.S.Collberg,N.F.Johnson,and P. Sallee, Eds., Alexandria, VA, Jul. 10–12, 2006, vol.
          4437, Lecture Notes in Computer Science, pp. 314–327.
[4].      R. Zhang, V. Sachnev, and H. J. Kim, “Fast BCH syndrome coding forsteganography,” in Proc. 11th Int. Workshop Inf.
          Hiding,,S.Katzen-beisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7–10, 2009,vol. 5806, Lecture Notes in Computer
          Science, pp. 31–47.
[5].      V. Sachnev, H. J. Kim, and R. Zhang, “Less detectable JPEG steganography method based on heuristic optimization and BCH
          syndrome coding,” in Proc. 11th ACM Multimedia Security Workshop,J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton,
          NJ, Sep. 7–8,2009, pp. 131–140.


                                                                 25
A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation

[6].    T. Pevný, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” in Proc.
        12th Int. Workshop Inf. Hiding,P.W.L.Fong,R.Böhme ,andR.Safavi-Naini,Eds., Calgary, Canada, Jun. 28–30, 2010, vol. 6387,
        Lecture Notes in Computer Science, pp. 161–177.
[7].    J. Kodovský and J. Fridrich, “On ompleteness of feature spaces in blind steganalysis,” in Proc. 10th ACMMultimedia
        SecurityWorkshop,A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U.K., Sep. 22–23,2008, pp. 123–132.
[8].    T. Filler and J. Fridrich, “Gibbs construction in steganography,” IEEE Trans. Inf. Forensics Security, vol. 5, pp. 705–720, Sep.
        2010.
[9].    J. Fridrich and T. Filler, “Practical methods for minimizing embedding impact in steganography,” in Proc. SPIE, Electron.
        Imag., Security, Steganography, Watermark. Multimedia Contents IX,E.J.Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29–
        Feb. 1, 2007, vol. 6505,pp. 02–03.
[10].   T. Filler and J. Fridrich, “Binary quantization using belief propagation over factor graphs of LDGM codes,” presented at the 45th
        Annu.Allerton Conf. Commun., Control, Comput., Allerton, IL, Sep. 26–28, 2007.
[11].   X. Zhang, W. Zhang, and S. Wang, “Efficient double-layered steganographic embedding,” Electron. Lett., vol. 43, pp. 482–483,
        Apr. 2007.
[12].   W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,”
        IEEE Commun Lett., vol. 11, pp. 680–682, Aug. 2007.
[13].   W. Zhang, X. Zhang, and S. Wang , “Maximizing steganographic embedding efficiency by combining Hamming codes and wet
        paper codes,” in Proc. 10th Int. Workshop Inf. Hiding, ,K.Solanki,K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun.
        19–21, 2008,vol. 5284, Lecture Notes in Computer Science, pp. 60–71.
[14].   T. Filler and J. Fridrich, “Wet ZZW construction for steganography,”presented at the 1st IEEE Int. Workshop Inf. Forensics
        security,London, U.K., Dec. 6–9, 2009.
[15].   W. Zhang and X. Zhu, “Improving the embedding efficiency of wetpaper codes by paper folding,” IEEE Signal Process. Lett.,
        vol. 16, pp.794–797, Sep. 2009.
[16].   W. Zhang and X. Wang, “Generalization of the ZZW embedding construction for steganography,” IEEE Trans. Inf. Forensics
        Security, vol 4, pp. 564–569, Sep. 2009.



Biographies

           Ch.Sairam presently pursuing his M .Tech in CSE,in ADAMS Engineering college. His interested areas are networking, data
           mining etc.



          B.Lakshmi completed her M.Tech in the Dept of CSE, Andhra University. She is presently working as Asst.prof in CSE Dept,
          ADAMS Engineering College. Her interested areas are Networking, Web technologies and Image processing etc.




                                                                 26

More Related Content

What's hot

IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 

What's hot (16)

E017443136
E017443136E017443136
E017443136
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Bi34381384
Bi34381384Bi34381384
Bi34381384
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
D010312230
D010312230D010312230
D010312230
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
G017444651
G017444651G017444651
G017444651
 

Viewers also liked

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Viewers also liked (7)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 

Similar to IJERD(www.ijerd.com)International Journal of Engineering Research and Development

Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED IJCERT JOURNAL
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 

Similar to IJERD(www.ijerd.com)International Journal of Engineering Research and Development (20)

O017429398
O017429398O017429398
O017429398
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING  TECHNIQUES
A SURVEY ON IMAGE STEGANOGRAPHY TYPES AND HIDING TECHNIQUES
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Av4102350358
Av4102350358Av4102350358
Av4102350358
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.YounusS2
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXTarek Kalaji
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfinfogdgmi
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?IES VE
 

Recently uploaded (20)

20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.Basic Building Blocks of Internet of Things.
Basic Building Blocks of Internet of Things.
 
VoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBXVoIP Service and Marketing using Odoo and Asterisk PBX
VoIP Service and Marketing using Odoo and Asterisk PBX
 
Videogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdfVideogame localization & technology_ how to enhance the power of translation.pdf
Videogame localization & technology_ how to enhance the power of translation.pdf
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?How Accurate are Carbon Emissions Projections?
How Accurate are Carbon Emissions Projections?
 

IJERD(www.ijerd.com)International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 12 (July 2012), PP.21-26 www.ijerd.com A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation CH.Sairam1, B.Lakshmi2 1 Dept of CSE, AME, Palavncha, India, 2 Asst.prof, Dept of CSE, AME, Palavncha, India Abstract––This paper proposes a new methodology for reducing additive distortion in steganography with embedding operation. In this paper it is planned to introduce a method that embed 2 bits information in a pixel and alter one bit from one bit plane but the message does not necessarily place in the least significant bit of pixel and second less significant bit plane and fourth less significant bit plane can also host the massage. In this approach we used a novel syndrome-coding scheme based on dual convolution codes equipped with the Viterbi algorithm. This fast and very versatile solution achieves state-of-the-art results in steganographic applications while having linear time and space complexity w.r.t. the number of cover elements. Security is provided by applying DES (Data Encryption Standard) for encryption and decryption of embedded message. Practical merit of this approach is validated by constructing and testing adaptive embedding schemes for digital images in raster and transform domains. Most current coding schemes used in steganography (matrix embedding, wet paper codes, etc.) and many new ones can be implemented using this framework. Keywords––STEGO, VITERBI, DES I. INTRODUCTION Steganography is the art and science of writing hidden messages in such a way that no one, apart from the Sender and intended recipient, suspects the existence of the message, a form of security through obscurity[1]. It is often thought that communications may be secured by encrypting the trac, but this has rarely been adequate in practice. Neas the Tactician, and other classical Writers, concentrated on methods for hiding messages rather than for enciphering them [2]. There exist two mainstream approaches to steganography in empirical covers, such as digital media objects steganography designed to preserve a chosen cover model and steganography minimizing a heuristically-defined embedding distortion today’s least detectable steganographic schemes for digital images [3]–[6] were designed using this principle. Moreover, when the distortion is defined as a norm between feature vectors extracted from cover and stego objects, minimizing distortion becomes tightly connected with model preservation insofar the features can be considered as a low-dimensional model of covers. This line of reasoning already appeared in [6] and [7] and was further developed in [8]. With the exception of [8], steganographers work with additive distortion functions obtained as a sum of single-letter distortions. A well-known example is matrix embedding where the sender minimizes the total number of embedding changes. Near-optimal coding schemes for this problem appeared in [9] and [10], together with other clever constructions and extensions [11]–[16]. In this paper it is planned to introduce a method that embed 2 bits information in a pixel and alter one bit from one bit plane but the message does not necessarily place in the least significant bit of pixel and second less significant bit plane and fourth less significant bit plane can also host the massage. Since in our method for embedding two bits message we alter just one bit plane, fewer pixels would be manipulated during embedding message in an image and it is expected for the steganalysis algorithm to have more difficulty detecting the covert communication. It is clear that in return complexity of the syst em would increase. In our method there are only three ways that a pixel is allowed to be changed: 1. Its least significant Bit would alter (So the gray level of the pixel would increased or decreased by one level) 2. The second less significant bit plane would alter (So the gray level of the pixel would increase or decrease by two levels) 3. The fourth less significant bit plane would alter (So the gray level of the pixel would increase or decrease by eight levels). For executing the process the code is written in JAVA language. And Simulation is done in MATLAB (for checking Histogram of Original & Stegno image). The paper is organized as fallows. In section II we described about the implementation process where in which how the data is taken and embedded and including decryption process is explained. And in section III about the experimental results showing all the pictorial view of all the results. In section IV analysis is done on this process and comparison graph is also plotted. And fallowed by conclusion section. II. IMPLEMENTATION Hiding information in text is historically the most important method of steganography. An obvious method was to hide a secret message in every nth letter of every word of a text message. It is only since the beginning of the Internet and all the different digital file formats that is has decreased in importance. Text steganography using digital files is not used very often since text files have a very small amount of redundant data. To hide information in audio files similar techniques are used as for image files. One different technique unique to audio steganography is masking, which exploits the properties of 21
  • 2. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation the human ear to hide information unnoticeably. A faint, but audible, sound becomes inaudible in the presence of another louder audible sound. This property creates a channel in which to hide information. Although nearly equal to images in steganography potential, the larger size of meaningful audio files makes them less popular to use than images. The term protocol steganography refers to the technique of embedding information within messages and network control protocols used in network transmission In this we have 2 modules A) Steg module B) UnSteg module Steg Module: In this module User need to write any secret information in Text area provided and need to select an Image file to which User wants to append the Secret Information Text. After Selecting the Image the processing of adding Secret Information to Image file takes place. In Steg Module only the Secret Text Information and Image to which Secret Text Information will be selected and the remaining process go on based on the pixels of image and Text given. UnSteg Module: In UnSteg module the Encrypted Image will be selected and Steganography Application will start decrypting it with each and every pixel of the Image and displays the output i.e. Secret Text Information. UnSteg module will be accepting only the Image which has the hidden text message in it. After decrypting the Image the Secret Text Information will be displayed from the Image by UnSteg Module. Data flow diagram Figure 1: The overall implementation flow Here in this process take the input image that is to be watermarked. The Input Module is designed as such a way that the proposed system must be capable of handling any type of data formats, such as if the user wishes to hide any image format then it must be compatible with all usual image formats such as jpg, gif, bmp, it must be also compatible with video formats such as avi, flv, wmf etc.And also it must be compatible with various document formats, so that the user can be able to use any formats to hide the secret data. The next process is watermarking. Watermarking is a technology for embedding various types of information in digital content. In general, information for protecting copyrights and proving the validity of data is embedded as a watermark. Watermarked content can prove its origin, thereby protecting the data. Next is encrypting the data. In this module we encrypt the data embedded image. The purpose of authenticator watermark of a block is invariant in the watermark embedding process; hence the watermark can be extracted without referring to the original content .The encryption and decryption techniques are used in this module. In applications, the method is required to be made robust so that embedded message can be deducted easily, even when stego images are slightly modified. In digital communications, information is transmitted bit-by-bit, i.e. as binary signaling. Larger the pulse size of the symbol higher is the probability of detection. Improvements of performance is due to the fact that for fewer symbols to hide we use more locations per symbol. Each symbol is represented by a pattern of binary bits. Next method is we flip an edge pixel in binary images is equivalent to shifting the edge location horizontally one pixel and vertically one pixel. A horizontal edge exists if there is a transition between two neighboring pixels vertically and a vertical edge exists if there is a transition between two neighboring pixels horizontally. We use spread spectrum watermark morphological content. The watermarked content is obtained by computing the inverse for the main processing block to reconstruct its candidate pixels. Use this module we going to see the original and watermarked content 22
  • 3. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation III. EXPERIMENTAL RESULTS Figure1: Figure showing the screen of login page of user Figures2: Figure showing the user entering the username and password. Figure 3: User interface picture showing the labels Figure 4: Inserting an input data for embedding 23
  • 4. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation Figure 5: Entering the input message to be embedded into the input data and encrypting the final data Figure 6: Entering the input message to be embedded into the input data and encrypting the final data Figure 7: Final page after encryption Figure8: Entering the password for decryption by receiver. IV. SIMULATION AND STEGANALYSIS RESULTS We will consider text-in-image embedding to demonstrate the simulation results, but the method can be used for other messages like binary images too, which was already analysized and given in IETE Technical Review. Fig 3 Output Results Visual Precept ion For any steganography based secure system, the perception of steganos should be as cover image itself so that one cannot differentiate them and detect the existence of embedded message. From fig 3, the cover image, processed cover image and stego images look similar and one is not able to distinguish them visually. 24
  • 5. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation Difference Analysis The “difference-images “obtained by taking the difference between cover, processed cover and stego images are not visible. For making the difference visible in “difference-images “ for visual interpretation, we first increase differences by multiplication of weight factor and then revert the values to get the strengthened “difference-images”. The strengthened difference-images obtained are shown in fig 4. From analysis of these “difference-images “, on could not say that the changes are either due to cover processing or message embedding and hence we can say that the method is safe from known cover-stego attack. Distortion Analysis Distortion analysis of stego images is carried out by studying distortion / similarity messages statistically. There are many methods for measuring distortion that can be used for distortion analysis. Distortion between two different images is measured by considering Mean Square Error (MSE), Mean Absolute Error (MAE) or Histogram Similarity (HS). Depth Vs Distortion Analysis Distortion occurred in different steganos is required by varying the depth of hiding for embedding information in cover image. The relation between depth of hiding used and distortion occurred in the stego images is shown in Fig 7. That depth of hiding within some LSB region is most suitable for message embedding as the distortion is very small in this region. As the depth of hiding increases beyond preferable region, the distortion becomes noticeable and unsuitable for message hiding. DISTORTION (MAE) DEPTH OF HIDING (D) Fig.9.Depth Vs Distortion Analysis Security A method, SBIPM, for providing the security of our important information has been proposed in this paper which is based on the techniques of signal processing, cryptography, and steganography. The security of information has been strengthened by applying scanning, coding, and encryption, cover processing and embedding techniques in the method. Reshaping step of the method provides robustness for detecting message correctly in such situation when stego image is distorted. The method developed is safe from various attacks. Simulation and steganalysis results shown in this paper shows that one will not be able to distinguish between cover and stego images. V. CONCLUSION Thus we conclude that the strength of security achieved is very high and unauthorized receiver will not be able to get back the original message using exhaustive without the knowledge of key parameters. Digital Steganography is interesting field and growing rapidly for information hiding in the area of information security. It has a vital role in defense as well as civil applications. In future we will more of secure systems based on this technology. REFERENCES [1]. Petitcolas, FAP; Anderson RJ; Kuhn MG (1999). Information hiding a survey Proceedings of the IEEE (special issue) 87 (7): 1062–78. . Retrieved 2008-09-02. [2]. A. Tacticus, How to survive under siege / Aineias the Tactician, pp. 84{90, 183{193. Clarendon ancient history series,Oxford, England: Clarendon Press, 1990, ISBN 0-19-814744-9,translated with introduction and commentary by David White head [3]. Y. Kim, Z. Duric, and D. Richards, “Modified matrix encoding technique for minimal istortion steganography,” in Proc. 8th Int. Workshop Inf. Hiding,J.L.Camenisch,C.S.Collberg,N.F.Johnson,and P. Sallee, Eds., Alexandria, VA, Jul. 10–12, 2006, vol. 4437, Lecture Notes in Computer Science, pp. 314–327. [4]. R. Zhang, V. Sachnev, and H. J. Kim, “Fast BCH syndrome coding forsteganography,” in Proc. 11th Int. Workshop Inf. Hiding,,S.Katzen-beisser and A.-R. Sadeghi, Eds., Darmstadt, Germany, Jun. 7–10, 2009,vol. 5806, Lecture Notes in Computer Science, pp. 31–47. [5]. V. Sachnev, H. J. Kim, and R. Zhang, “Less detectable JPEG steganography method based on heuristic optimization and BCH syndrome coding,” in Proc. 11th ACM Multimedia Security Workshop,J. Dittmann, S. Craver, and J. Fridrich, Eds., Princeton, NJ, Sep. 7–8,2009, pp. 131–140. 25
  • 6. A Novel method of Reducing Additive Distortion in Steganography with Embedding Operation [6]. T. Pevný, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” in Proc. 12th Int. Workshop Inf. Hiding,P.W.L.Fong,R.Böhme ,andR.Safavi-Naini,Eds., Calgary, Canada, Jun. 28–30, 2010, vol. 6387, Lecture Notes in Computer Science, pp. 161–177. [7]. J. Kodovský and J. Fridrich, “On ompleteness of feature spaces in blind steganalysis,” in Proc. 10th ACMMultimedia SecurityWorkshop,A. D. Ker, J. Dittmann, and J. Fridrich, Eds., Oxford, U.K., Sep. 22–23,2008, pp. 123–132. [8]. T. Filler and J. Fridrich, “Gibbs construction in steganography,” IEEE Trans. Inf. Forensics Security, vol. 5, pp. 705–720, Sep. 2010. [9]. J. Fridrich and T. Filler, “Practical methods for minimizing embedding impact in steganography,” in Proc. SPIE, Electron. Imag., Security, Steganography, Watermark. Multimedia Contents IX,E.J.Delp and P. W. Wong, Eds., San Jose, CA, Jan. 29– Feb. 1, 2007, vol. 6505,pp. 02–03. [10]. T. Filler and J. Fridrich, “Binary quantization using belief propagation over factor graphs of LDGM codes,” presented at the 45th Annu.Allerton Conf. Commun., Control, Comput., Allerton, IL, Sep. 26–28, 2007. [11]. X. Zhang, W. Zhang, and S. Wang, “Efficient double-layered steganographic embedding,” Electron. Lett., vol. 43, pp. 482–483, Apr. 2007. [12]. W. Zhang, S. Wang, and X. Zhang, “Improving embedding efficiency of covering codes for applications in steganography,” IEEE Commun Lett., vol. 11, pp. 680–682, Aug. 2007. [13]. W. Zhang, X. Zhang, and S. Wang , “Maximizing steganographic embedding efficiency by combining Hamming codes and wet paper codes,” in Proc. 10th Int. Workshop Inf. Hiding, ,K.Solanki,K. Sullivan, and U. Madhow, Eds., Santa Barbara, CA, Jun. 19–21, 2008,vol. 5284, Lecture Notes in Computer Science, pp. 60–71. [14]. T. Filler and J. Fridrich, “Wet ZZW construction for steganography,”presented at the 1st IEEE Int. Workshop Inf. Forensics security,London, U.K., Dec. 6–9, 2009. [15]. W. Zhang and X. Zhu, “Improving the embedding efficiency of wetpaper codes by paper folding,” IEEE Signal Process. Lett., vol. 16, pp.794–797, Sep. 2009. [16]. W. Zhang and X. Wang, “Generalization of the ZZW embedding construction for steganography,” IEEE Trans. Inf. Forensics Security, vol 4, pp. 564–569, Sep. 2009. Biographies Ch.Sairam presently pursuing his M .Tech in CSE,in ADAMS Engineering college. His interested areas are networking, data mining etc. B.Lakshmi completed her M.Tech in the Dept of CSE, Andhra University. She is presently working as Asst.prof in CSE Dept, ADAMS Engineering College. Her interested areas are Networking, Web technologies and Image processing etc. 26