SlideShare a Scribd company logo
1 of 17
Download to read offline
Raf. J. of Comp. & Math’s. , Vol. 7, No. 3, 2010
Third Scientific Conference Information Technology 2010 Nov. 29-30
91
An Investigation for Steganography using Different Color System
Amira B. Sallow Zahraa M. Taha Ahmed S. Nori
College of Computer Sciences and Mathematics
University of Mosul
Received on:2/9/2010 Accepted on:10/11/2010
‫ﺍﻟ‬‫ﻤﻠﺨﺹ‬
‫ﺘﻐ‬ ‫ﻁﺭﺍﺌﻕ‬ ‫ﺍﺴﺘﺨﺩﻤﺕ‬‫ﻤﻥ‬ ‫ﻭﺤﻤﺎﻴﺘﻬﺎ‬ ‫ﺍﻷﻫﻤﻴﺔ‬ ‫ﺫﺍﺕ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺨﺼﻭﺼﻴﺔ‬ ‫ﻋﻠﻰ‬ ‫ﻟﻠﺤﻔﺎﻅ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻁﻴﺔ‬
‫ﻤﻭﺜﻭﻕ‬ ‫ﻏﻴﺭ‬ ‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﺃﻭ‬ ‫ﺴﺭﻗﺔ‬ ‫ﺃﻱ‬‫ﺍﻻﻨﺘﺭﻨﻴﺕ‬ ‫ﻤﻊ‬ ‫ﺍﻟﺘﻌﺎﻤل‬ ‫ﻋﻨﺩ‬ ‫ﺨﺎﺼﺔ‬.‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺔ‬ ‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﺘﻡ‬ ،‫ﺍﻟﺒﺤﺙ‬ ‫ﻫﺫﺍ‬ ‫ﻓﻲ‬
‫ﺃﻫﻤﻴﺔ‬ ‫ﺍﻷﻗل‬ ‫ﺍﻟﺨﺎﻨﺔ‬ ‫ﺒﻭﺍﺴﻁﺔ‬LSBLeast Significant Bit‫ﺃﻨـ‬ ‫ﻋﺩﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻤﻥ‬ ‫ﻜﺒﻴﺭﺓ‬ ‫ﻜﻤﻴﺔ‬ ‫ﻟﺘﻀﻤﻴﻥ‬‫ﻭﺍﻉ‬
‫ﻤﺜل‬ ،‫ﺍﻟﻠﻭﻨﻴﺔ‬ ‫ﺍﻟﻨﻅﻡ‬ ‫ﻤﻥ‬)RGB, HSV, YCbCr, YIQ, YUV.(
‫ﻗﻴﻤﺔ‬ ‫ﺒﺘﺤﻭﻴل‬ ‫ﺍﻟﻔﻜﺭﺓ‬ ‫ﺘﺘﻠﺨﺹ‬RGB‫ﻤﻥ‬‫ﻀ‬‫ﹸ‬‫ﺘ‬‫ﻟ‬ ‫ﻤﻨﻔﺼﻠﺔ‬ ‫ﻤﺠﺎﻤﻴﻊ‬ ‫ﺜﻼﺙ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﻟﻠﺭﺴﺎﻟﺔ‬ ‫ﺍﻟﻀﻭﺌﻴﺔ‬ ‫ﻟﻠﻨﻘﺎﻁ‬
‫ﻟﻠﻐﻁﺎﺀ‬ ‫ﺍﻟﻀﻭﺌﻴﺔ‬ ‫ﺍﻟﻨﻘﺎﻁ‬ ‫ﺩﺍﺨل‬.‫ﺍﻟﻤﻘﺎﻴﻴﺱ‬ ‫ﺍﺴﺘﺨﺩﻤﺕ‬)MSE, SNR, PSNR(‫ﺍﻟﻠﻭﻨﻴـﺔ‬ ‫ﺍﻟـﻨﻅﻡ‬ ‫ﺒـﻴﻥ‬ ‫ﻟﻠﻤﻘﺎﺭﻨـﺔ‬
‫ﻭﺍﺜ‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬‫ﺍﻟﻠﻭﻨﻴـﺔ‬ ‫ﺍﻟﻨﻅﻡ‬ ‫ﺫﺍﺕ‬ ‫ﺍﻟﻤﻠﻔﺎﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺘﻐﻁﻴﺔ‬ ‫ﻁﺭﻴﻘﺔ‬ ‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻥ‬ ‫ﺍﻟﻤﻘﺎﺭﻨﺎﺕ‬ ‫ﺒﺘﺕ‬
)HIS and RGB(‫ﺍﻓﻀل‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﺘﻌﻁﻲ‬.
ABSTRACT
Steganographic techniques are generally used to maintain the confidentiality of
valuable information and to protect it from any possible theft or unauthorized use
especially over the internet. In this paper, Least Significant Bit LSB-based
Steganographic techniques is used to embed large of data in different color space
models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by
transforming the RGB value of the secret image pixels into three separate components
into the pixels of the cover image.
The measures (MSE, SNR, PSNR) were used to compare between the color
space models, the comparisons proved that steganography with color systems (RGB
and HIS) shown a best results.
1. Introduction:
Colors are specified for an image by using a color model. The color model’s
components must be mapped to values (to generate a color space) and these values
combined in a meaningful way for each pixel in the image. In English, this means for
an image represented by the RGB color model, each pixel needs a red, green and blue
value assignment.
The purpose of color models is to organize colors in a standard form. Different
models are used according to the user’s need. These models are divided in two models:
hardware oriented and color manipulation. The color models include RGB, HSI, HSV,
YCbCr, YIQ, CMY, CMYK
Color is what you perceive when light within a certain wavelength range hits
your eyes. This definition may sound a bit trite, but there is an important implication
contained within: color does not exist in the physical world. Indeed, color is entirely
subjective and dependent on the observer’s eyes, brain and connecting hardware; color
is truly in the brain of the beholder.In other words, color is not an absolute
Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori
92
characteristic of an object, but a human perception. The color stimulants registered by
the retina of the eye are made up of the energy distribution and spectral properties of
the visible light passing through or reflected by an object.
color model is a mathematically consistent way of expressing colors. The
mathematics of a color model allow you to express any perceived color as a
combination of the components of the model. For example, a color represented in the
RGB color model is a mixture of three values: a value for red, green, and blue.[1][2]
2. Color Model types
2.1 RGB color model
The RGB color model is an additive color model in which Red, Green, and
Blue light are added together in various ways to reproduce a broad array of colors. The
name of the model comes from the initials of the three additive primary colors, Red,
Green, and Blue.
The main purpose of the RGB color model is for the sensing, representation, and
display of images in electronic systems, such as televisions and computers, though it
has also been used in conventional photography. Before the electronic age, the RGB
color model already had a solid theory behind it, based in human perception of colors,
See figure(1).
RGB is a device-dependent color space: different devices detect or reproduce a
given RGB value differently, since the color elements (such as phosphors or dyes) and
their response to the individual R, G, and B levels vary from manufacturer to
manufacturer, or even in the same device over time. Thus an RGB value does not
define the same color across devices without some kind of color management.[3][4]
R G B
Figure(1): An image along with its R, G, and B components
2.2 HSL AND HSV COLOR MODEL
In the HSB (Hue, Saturation , Brightness) and HSL (Hue , Saturation,
Lightness) models, you specify Hue or color as an angle from 0 to 360 degrees on a
color wheel, and Saturation , Brightness , and Lightness as percentages.
An Investigation for Steganography using …
93
Saturation is the intensity of a color . at 100 percent Saturation, a color is pure;
at 0 percent Saturation, the color is white , black or gray. Lightness or Brightness is the
percentage of black or white that is mixed with a color. A Lightness of 100 percent
will yield a white color; 0 percent is black; the pure color has a percent Lightness, See
figure (2).
H S V
Figure(2): An image along with its H , S and V components
HSL stands for Hue, Saturation, and Lightness, and is often also called HLS.
HSV stands for Hue, Saturation, and value, and is also often called HSB (B for
Brightness). A third model, common in computer vision applications, is HSI, for Hue,
Saturation, and Intensity. Unfortunately, while typically consistent, these definitions
are not standardized, and any of these abbreviations might be used for any of these
three or several other related cylindrical models.
HSL, HSV, HSI, or related models are often used in computer vision and
image analysis for feature detection or image segmentation. The applications of such
tools include object detection, for instance in robot vision; object recognition, for
instance of faces, text, or license plates; content-based image retrieval; and analysis of
medical images.[3][4]
( ) ( )[ ]
( ) ( )( )[ ]
( )
( )[ ]
( )



















++=
++
−=












−−+−
−+−
=



<−
≤
=
=
−
BGRI
BGR
BGR
S
BGBRGR
BRGR
where
GBif
GBif
H
HSI
3
1
,,min
3
1
2
1
cos
360
2
1
2
1
θ
θ
θ
…(1)
Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori
94
( )
( )









−=
+−=








−
+=
=
Ο
SIB
BRIG
H
HS
IR
RGB
1
3
)60cos(
)cos(*
1
…(2)
2.3 YCbCr color model
YCbCr is sometimes abbreviated to YCC. Y′CbCr is often called YPbPr
when used for analog component video, although the term Y′CbCr is commonly used
for both systems, with or without the prime. Y′CbCr is often confused with the YUV
color space, and typically the terms YCbCr and YUV are used interchangeably,
leading to some confusion; when referring to signals in video or digital form, the term
"YUV" mostly means "Y′CbCr", See figure (3).
Y CB CR
Figure(3): An image along with its Y, CB, and CR components
YCbCr or Y′CbCr, sometimes written YCBCR or Y′CBCR, is a family of
color spaces used as a part of the color image pipeline in video and digital photography
systems. Y′ is the Luma component and CB and CR are the Blue-difference and Red-
difference Chroma components. Y′ (with prime) is distinguished from Y which is
luminance, meaning that light intensity is non-linearly encoded using gamma
correction. Y′CbCr is not an absolute color space, it is a way of encoding RGB
information. The actual color displayed depends on the actual RGB colorants used to
display the signal.[2][4]




















−−
−−+










=










B
G
R
C
C
Y
r
b
214.18786.93112
112203.74797.37
966.24553.128481.65
128
128
16
…(3)




















−




















=










128
128
16
00.007910710.00456621
0.00318811-0.00153632-0.00456621
0.0062589300.00456621
r
b
C
C
Y
B
G
R
…(4)
An Investigation for Steganography using …
95
2.4 YIQ COLOR MODEL
YIQ IS THE COLOR SPACE USED BY THE NTSC COLOR TV SYSTEM, EMPLOYED
MAINLY IN NORTH AND CENTRAL AMERICA, AND JAPAN. THE Y COMPONENT
REPRESENTS THE LUMA INFORMATION, AND IS THE ONLY COMPONENT USED BY BLACK-
AND-WHITE TELEVISION RECEIVERS. I AND Q REPRESENT THE CHROMINANCE
INFORMATION, SEE FIGURE (4). [1][4][5]
Y I Q
Figure(4): An image along with its Y, I, and Q components
The YIQ system is intended to take advantage of human color-response
characteristics. The eye is more sensitive to changes in the orange-blue (I) range than
in the purple-green range (Q) , therefore less bandwidth is required for Q than for I.
The YIQ representation is sometimes employed in color image processing
transformations. For example, applying a histogram equalization directly to the
channels in an RGB image would alter the colors in relation to one another, resulting
in an image with colors that no longer make sense. Instead, the histogram equalization
is applied to the Y channel of the YIQ representation of the image, which only
normalizes the Brightness levels of the image. The formulae approximate the
conversion between the RGB color space and YIQ is as follow:




















−
−−=










B
G
R
Q
I
Y
311135.0522591.0211456.0
321263.0274453.0595716.0
11400.058700.029900.0
…(5)




















−
−−=










Q
I
Y
B
G
R
7046.111070.11
6474.02721.01
6210.09563.01
…(6)
Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori
96
2.5 CMYK color model
Unlike RGB, which is an additive color model, CMYK is a subtractive color
model. Typically used in printing, CMYK assumes that the background is white, and
thus subtracts the assumed Brightness of the white background from four colors: Cyan,
Magenta, Yellow, and black (called “key”). Black is used because the combination of
the three primary colors (CMY) doesn’t produce a fully saturated black. CMYK can
produce the whole spectrum of visible colors thanks to the process of half-toning,
whereby each color is assigned a Saturation level and miniscule dots of each of the
three colors are printed in tiny patterns so that the human eye perceives a certain color.
Like RGB, CMYK is device-dependent. There’s no straightforward formula to
convert CMYK color to RGB colors or vice versa, so conversion is typically
dependent upon color management systems. ColoRotate easily converts one system to
the other, See figure (5). [3][4]
C M Y K
Figure(5): An image along with its C, M, Y and K components
2.6 YUV COLOR MODEL
YUV is a color space typically used as part of a color image pipeline. It
encodes a color image or video taking human perception into account, allowing
reduced bandwidth for chrominance components, thereby typically enabling
transmission errors or compression artifacts to be more efficiently masked by the
human perception than using a "direct" RGB-representation, See figure (6).
An Investigation for Steganography using …
97
Y U G
Figure(6): An image along with its Y, U, and V components
Other color spaces have similar properties, and the main reason to implement
or investigate properties of Y'UV would be for interfacing with analog or digital
television or photographic equipment that conforms to certain Y'UV standards.
The scope of the terms Y'UV, YUV, YCbCr, YPbPr, etc., is sometimes
ambiguous and overlapping. Historically, the terms YUV and Y'UV were used for a
specific analog encoding of color information in television systems, while YCbCr was
used for digital encoding of color information suited for video and still-image
compression and transmission such as MPEG and JPEG. Today, the term YUV is
commonly used in the computer industry to describe file-formats that are encoded
using YCbCr.
The Y'UV model defines a color space in terms of one luma (Y') and two
chrominance (UV) components. The Y'UV color model is used in the NTSC, PAL,
and SECAM composite color video standards. Previous black-and-white systems used
only luma (Y') information. Color information (U and V) was added separately via a
sub-carrier so that a black-and-white receiver would still be able to receive and display
a color picture transmission in the receiver's native black-and-white format.
Y' stands for the luma component (the Brightness) and U and V are the
chrominance (color) components; luminance is denoted by Y and luma by Y' – the
prime symbols (') denote gamma compression, with "luminance" meaning perceptual
(color science) Brightness, while "luma" is electronic (voltage of display)
Brightness.[4]




















−−
−−=










B
G
R
V
U
Y
10001.051499.061500.0
43600.028886.014713.0
11400.058700.029900.0
…(7)




















−−=










V
U
Y
B
G
R
003211.21
58060.039465.01
13983.101
…(8)
Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori
98
3. RELATED WORK
§ Adnan Abdul-Aziz Gutub, he use an improved technique that takes the advantage
of the 24 bits in each pixel in the RGB images using the two least significant bits of
one channel to indicate existence of data in the other two channels.[6 ]
§ Rajanikanth Reddy Koppola, he use LSB-based steganography technique to embed
large amount of data in RGBA images while keeping the perceptual degradation to a
minimum. And use the YIQ color space model to transform the RGB value of the
secret image pixel into three separate components, which are then embedded into the
least significant bits of each color pixel in the cover image. [5]
§ Sos S. Agaian and Juan P. Perez, they propose a steganographic approach for
palette-based images. That method had the advantage of embedding secure data,
within the index, the palette or both, using special sorting scheme. In the index,
information can be embedded using a double pseudo random key that selects blocks
and pixels within the image randomly. A stego-bit is embedded at each pixel of
the selected blocks. Embedding is accomplished by selecting the closest color using a
weighted distance measure that contains the desired modulus-bit. This algorithm also
gives you the option of selecting the best color models (i.e. YCbCr and HSV) for
embedding purposes.[7]
4. STEGANOGRAPHY
Steganography is the art of hiding communication. The idea is to hide a
message inside some cover media without modifying the perception of the media. As
an example, many image files contain redundant information. Altering this information
does not affect the visual appearance of the image. This fact can be used to create a
steganographic system. By embedding a message into the redundant bits of an image,
we can send secret messages by posting the images on the web.
Different types of steganographic techniques have been used that employ invisible
inks, microdots, character arrangement, digital signatures, covert channel, and spread
spectrum communications. Electronic steganography techniques use digital ways of
hiding and detecting processes. Steganography is different than cryptography and
watermarking although they all have overlapping usages in the information hiding
processes. Steganography security hides the knowledge that there is information in the
cover medium.Watermarking is different from steganography in its main goal.
Watermarking aim is to protect the cover medium from any modification with no real
emphasis on secrecy.
It can be observed as steganography that concentrates onhigh robustness and
very low or almost no security . Steganography, in general, may have different
applications. For example, steganography can be utilized for posting secret
communications on the Web to avoid transmission or to hide data on the network in
case of a violation. It can be useful for copyright protection, which is, in reality, digital
watermarking. Copyright protection is to protect the cover medium from claiming its
credit be others, with no real emphasis on secrecy. Stego Applications can involve
"ownership evidence, fingerprinting, authentication and integrity verification, content
labeling and protection, and usage control".[1][2][8]
5.The Proposed Hiding Algorithm
In this paper ,a steganographic algorithm was designed and implemented.
Besides, different color models were implemented and programmed to improve the
steganographic technique that deals with all these models .
An Investigation for Steganography using …
99
The algorithm can be summarized as:
Step 1: Read color cover_image like C.
Step 2: Image resize to be as secret image size (512x512)
Step 3: Read binary secret _image like S.
Step 4: Convert color made of C to one of the following color model.
a) RGB
b) YCbCr
c) HSV
d) YIQ
e) YUV
Step 5: For converting from RGB to any of these color model, We use the equations
Number (1),(3),(5),(7).
Step 6: Choose the best slide image from C to hide the secret image in it, and call it
Z. From testing we discover that the best slide to hide for each model is:
IF RGB then Z=R
IF Ycbcr then Z= Cb
IF HSV then Z=V
IF YIQ then Z=Y
IF YUV then Z=Y
Step 7: [r, c] = size (Z)
For i=1 to r // r = row
For j=1 to c // c = column
hide S(i,j) pixel in the LSB of Z (i,j)
end
end
Step 8: Convert Z back to RGB using equation (2), (4), (6), (8).
Step 9: Store the steg image.
6.The Proposed Extraction Algorithm
As mensioned in the previous paragraph, here the operation working in reverse
manner, so to get the secret message the steps should be in the following sequence :
Step 1: Read steg image to Xc.
Step 2: For converting from RGB to any of these color model, We use the equations
Number (1),(3),(5),(7)
Step 3: Select the slide where the secret message was hide , and call it Xz. From
testing
we discover that best slide to hide for each model is:
IF RGB then Xz=R
IF Ycbcr then Xz = Cb
IF HSV then Xz =V
IF YIQ then Xz =Y
IF YUV then Xz =Y
Step 4: [r,c] = size (Xz)
For i=1 to r // r = row
For j=1 to c // c = column
Extract LSB of Xz(i,j) and put it A(i,j)
end
end
Step 6: Store the secret image
Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori
100
7. Performance Measurements
To know the amount of difference between the original image and the target
image(Stego-image),three kinds for performance measurements between the two
images are used,which are
[4][5]:
1- Mean square error or MSE is one of many ways to quantify the difference
between an estimator and the true value of the quantity being estimated and it’s
equation is:
( ) ( )∑∑
−
=
−
=
−=
1
0
1
0
,_cov,_
1 m
x
n
y
yximeryximsteg
mn
MSE …(9)
2- Signal-to-noise ratio (often abbreviated SNR or S/N) is a measure used in
science and engineering to quantify how much a signal has been corrupted by noise. It
is defined as the ratio of signal power to the noise power corrupting the signal.
( )( )
( ) ( )( ) 











−
=
∑∑
∑∑
−
=
−
=
−
=
−
=
1
0
1
0
2
1
0
1
0
2
10
,_cov,_
,_cov
log.10 m
x
n
y
m
x
n
y
yximeryximsteg
yximer
SNR
…(10)
3- peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the
ratio between the maximum possible power of a signal and the power of corrupting
noise that affects the fidelity of its representation.
( )






=
RMSE
PSNR
levelGrayofMax value
log.20 10 …(11)
MSERMSE = …(12)
An Investigation for Steganography using …
101
8. Results
See figures (7)(8)(9) and (10), also tables (1)(2)(3) and (4).
Figure(7): Final Results For Applying Different Color Models Using Sample (1)
Cover Image Stego Image Secret Image
Extracted Secret
Image
RGBHSVYcbcrYIQYUV
Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori
102
Figure(8): Final Results For Applying Different Color Models Using Sample (2)
Cover Image Stego Image Secret Image
Extracted Secret
Image
RGBHSVYcbcrYIQYUV
An Investigation for Steganography using …
103
Figure(9): Final Results For Applying Different Color Models Using Sample (3)
Cover Image Stego Image Secret Image
Extracted Secret
Image
RGBHSVYcbcrYIQYUV
Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori
104
Figure(10): Final Results For Applying Different Color Models Using Sample (4)
Cover Image Stego Image Secret Image
Extracted Secret
ImageRGBHSVYcbcrYIQYUV
An Investigation for Steganography using …
105
Table (1): comparisons between the different color models
Table (2): comparisons between the different color models
Images
Measures
RGB HSV YCBCR YIQ YUV
MSE 0.132977 0.355536 0.799234 82.435430 15.241652
SNR 50.555823 46.279980 42.448595 6.470313 5.503946
PSNR 56.893054 52.621966 49.104065 28.969665 36.300483
Table (3): comparisons between the different color models
Images
Measures
RGB HSV YCBCR YIQ YUV
MSE 0.372122 0.298155 0.457161 80.338722 12.047230
SNR 46.784296 48.471867 44.468233 6.136386 6.182842
PSNR 52.423945 53.386376 51.530112 29.081554 37.321932
Images
Measures
RGB HSV YCBCR YIQ YUV
MSE 0.132913 0.361792 0.756934 82.905178 10.963295
SNR 50.266757 45.984566 42.155010 6.028304 6.754600
PSNR 56.895131 52.546211 49.340224 28.944987 37.731393
Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori
106
Table (4): comparisons between the different color models
9.Conclusions
The imperceptibility of steganography is one of the most important measures
that evaluate the performance of the steganography algorithm.
The global evaluation models (MSE, SNR, and PSNR) which are widely used by most
researchers were presented and used to evaluate the performance of steganography
algorithm effectively.
Experimental results demonstrate that our algorithm achieves high embedding
capacity while preserving good image quality and high security; especially when using
the color models (RGB and HSI).
The important and distinctive features in the proposed method are to minimize the
degradation of stego image.
Images
Measures
RGB HSV YCBCR YIQ YUV
MSE 0.137831 0.298155 0.708468 82.435430 44.943413
SNR 51.772122 48.471867 44.166045 6.470313 4.923764
PSNR 56.737323 53.386376 49.627600 28.969665 31.604143
An Investigation for Steganography using …
107
REFERNCE
[1]. Nelson, P. , 2007, “The Photographer’s Guide to Color Management:
professional techniques for consistent results”, Amherst Media , Korea.
[2]. Rattanapitak, W. and Udomhunsakul, S. , 2010 , “Comparative Efficiency of
Color Models for Multi-focus Color Image Fusion”, Hong Kong.
[3]. Cheddad, A. , Condell, J. , and Curran, K. , 2009 “A Skin Tone Detection
Algorithm for an Adaptive Approach to Steganography “ , School of
Computing and Intelligent Systems, Faculty of Computing and Engineering ,
University of Ulster, Londonderry, United Kingdom.
[4]. Vaughan, T. , 2007, “ Multimedia Making it Work” seventh edition, Osborne-
McGraw Hill.
[5]. Koppola, R.R. , 2009 , “ A HIGH CAPACITY DATA-HIDING SCHEME IN
LSB-BASED IMAGE STEGANOGRAPHY” , Master thesis , University of
Akron
[6]. Gutub ,A.A. , 2010 , “Pixel Indicator Technique for RGB Image
Steganography” , Center of Excellence in Information Assurance (CoEIA),
King Saud University, Saudi Arabia.
[7]. Agaian, S.S. , and Perez , J.P. , 2004 , “NEW PIXEL SORTING METHOD
FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL
SELECTION “ ,The University of Texas, San Antonio,
[8]. Gonzalez, R.C. , and Woods, R.E. , 2002, “Digital Image Processing”,
Prentice-Hall, USA.

More Related Content

What's hot

Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processingkiruthiammu
 
Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: BasicsA B Shinde
 
Color image processing
Color image processingColor image processing
Color image processingrmsurya
 
Color fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image ProcessingColor fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image ProcessingAmna
 
Color and color models
Color and color modelsColor and color models
Color and color modelsSafwan Hashmi
 
10 color image processing
10 color image processing10 color image processing
10 color image processingbabak danyal
 
Comprehensive Infrared Image Edge detection Algorithm
Comprehensive Infrared Image Edge detection AlgorithmComprehensive Infrared Image Edge detection Algorithm
Comprehensive Infrared Image Edge detection AlgorithmCSCJournals
 
Chapter 6 color image processing
Chapter 6 color image processingChapter 6 color image processing
Chapter 6 color image processingasodariyabhavesh
 
A comparative study of histogram equalization based image enhancement techniq...
A comparative study of histogram equalization based image enhancement techniq...A comparative study of histogram equalization based image enhancement techniq...
A comparative study of histogram equalization based image enhancement techniq...sipij
 
HSI MODEL IN COLOR IMAGE PROCESSING
HSI MODEL IN COLOR IMAGE PROCESSING HSI MODEL IN COLOR IMAGE PROCESSING
HSI MODEL IN COLOR IMAGE PROCESSING anam singla
 
DIGITAL VIDEO HOLOGRAPHY- A ROBUST TOOL FOR COMMUNICATION
DIGITAL VIDEO HOLOGRAPHY- A ROBUST TOOL FOR COMMUNICATIONDIGITAL VIDEO HOLOGRAPHY- A ROBUST TOOL FOR COMMUNICATION
DIGITAL VIDEO HOLOGRAPHY- A ROBUST TOOL FOR COMMUNICATIONcscpconf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
The Impact of Color Space and Intensity Normalization to Face Detection Perfo...
The Impact of Color Space and Intensity Normalization to Face Detection Perfo...The Impact of Color Space and Intensity Normalization to Face Detection Perfo...
The Impact of Color Space and Intensity Normalization to Face Detection Perfo...TELKOMNIKA JOURNAL
 
Information Preserving Color Transformation for Protanopia and Deuteranopia (...
Information Preserving Color Transformation for Protanopia and Deuteranopia (...Information Preserving Color Transformation for Protanopia and Deuteranopia (...
Information Preserving Color Transformation for Protanopia and Deuteranopia (...Jia-Bin Huang
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representationMazin Alwaaly
 

What's hot (20)

Color Image Processing
Color Image ProcessingColor Image Processing
Color Image Processing
 
Lect 06
Lect 06 Lect 06
Lect 06
 
Color Image Processing: Basics
Color Image Processing: BasicsColor Image Processing: Basics
Color Image Processing: Basics
 
Color image processing
Color image processingColor image processing
Color image processing
 
Color fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image ProcessingColor fundamentals and color models - Digital Image Processing
Color fundamentals and color models - Digital Image Processing
 
Color and color models
Color and color modelsColor and color models
Color and color models
 
10 color image processing
10 color image processing10 color image processing
10 color image processing
 
Color image processing
Color image processingColor image processing
Color image processing
 
Comprehensive Infrared Image Edge detection Algorithm
Comprehensive Infrared Image Edge detection AlgorithmComprehensive Infrared Image Edge detection Algorithm
Comprehensive Infrared Image Edge detection Algorithm
 
Color models
Color modelsColor models
Color models
 
Chapter 6 color image processing
Chapter 6 color image processingChapter 6 color image processing
Chapter 6 color image processing
 
A comparative study of histogram equalization based image enhancement techniq...
A comparative study of histogram equalization based image enhancement techniq...A comparative study of histogram equalization based image enhancement techniq...
A comparative study of histogram equalization based image enhancement techniq...
 
HSI MODEL IN COLOR IMAGE PROCESSING
HSI MODEL IN COLOR IMAGE PROCESSING HSI MODEL IN COLOR IMAGE PROCESSING
HSI MODEL IN COLOR IMAGE PROCESSING
 
DIGITAL VIDEO HOLOGRAPHY- A ROBUST TOOL FOR COMMUNICATION
DIGITAL VIDEO HOLOGRAPHY- A ROBUST TOOL FOR COMMUNICATIONDIGITAL VIDEO HOLOGRAPHY- A ROBUST TOOL FOR COMMUNICATION
DIGITAL VIDEO HOLOGRAPHY- A ROBUST TOOL FOR COMMUNICATION
 
Color models
Color modelsColor models
Color models
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
The Impact of Color Space and Intensity Normalization to Face Detection Perfo...
The Impact of Color Space and Intensity Normalization to Face Detection Perfo...The Impact of Color Space and Intensity Normalization to Face Detection Perfo...
The Impact of Color Space and Intensity Normalization to Face Detection Perfo...
 
Image processing
Image processingImage processing
Image processing
 
Information Preserving Color Transformation for Protanopia and Deuteranopia (...
Information Preserving Color Transformation for Protanopia and Deuteranopia (...Information Preserving Color Transformation for Protanopia and Deuteranopia (...
Information Preserving Color Transformation for Protanopia and Deuteranopia (...
 
Multimedia graphics and image data representation
Multimedia graphics and image data representationMultimedia graphics and image data representation
Multimedia graphics and image data representation
 

Similar to An Investigation of Color Space Models for Steganography

COMPARATIVE ANALYSIS OF SKIN COLOR BASED MODELS FOR FACE DETECTION
COMPARATIVE ANALYSIS OF SKIN COLOR  BASED MODELS FOR FACE DETECTIONCOMPARATIVE ANALYSIS OF SKIN COLOR  BASED MODELS FOR FACE DETECTION
COMPARATIVE ANALYSIS OF SKIN COLOR BASED MODELS FOR FACE DETECTIONsipij
 
A PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGES
A PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGESA PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGES
A PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGEScscpconf
 
Lecnoninecolorspacemodelindigitalimageprocess
LecnoninecolorspacemodelindigitalimageprocessLecnoninecolorspacemodelindigitalimageprocess
LecnoninecolorspacemodelindigitalimageprocessIrsaAamir
 
Question bank for students.pdf
Question bank for students.pdfQuestion bank for students.pdf
Question bank for students.pdfNehaVerma258827
 
Study of Color Image Processing For Capturing and Comparing Images
Study of Color Image Processing For Capturing and Comparing ImagesStudy of Color Image Processing For Capturing and Comparing Images
Study of Color Image Processing For Capturing and Comparing Imagespaperpublications3
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Colorization of Gray Scale Images in YCbCr Color Space Using Texture Extract...
Colorization of Gray Scale Images in YCbCr Color Space Using  Texture Extract...Colorization of Gray Scale Images in YCbCr Color Space Using  Texture Extract...
Colorization of Gray Scale Images in YCbCr Color Space Using Texture Extract...IOSR Journals
 
Evaluation of Euclidean and Manhanttan Metrics In Content Based Image Retriev...
Evaluation of Euclidean and Manhanttan Metrics In Content Based Image Retriev...Evaluation of Euclidean and Manhanttan Metrics In Content Based Image Retriev...
Evaluation of Euclidean and Manhanttan Metrics In Content Based Image Retriev...IJERA Editor
 
Color image processing ppt
Color image processing pptColor image processing ppt
Color image processing pptMvidhya9
 
Color-in-Digital-Image-Processing.pptx
Color-in-Digital-Image-Processing.pptxColor-in-Digital-Image-Processing.pptx
Color-in-Digital-Image-Processing.pptxEveCarolino
 
Establishment of an Efficient Color Model from Existing Models for Better Gam...
Establishment of an Efficient Color Model from Existing Models for Better Gam...Establishment of an Efficient Color Model from Existing Models for Better Gam...
Establishment of an Efficient Color Model from Existing Models for Better Gam...CSCJournals
 
Basics of image processing & analysis
Basics of image processing & analysisBasics of image processing & analysis
Basics of image processing & analysisMohsin Siddique
 
Explicit Content Image Detection
Explicit Content Image DetectionExplicit Content Image Detection
Explicit Content Image Detectionsipij
 

Similar to An Investigation of Color Space Models for Steganography (20)

COMPARATIVE ANALYSIS OF SKIN COLOR BASED MODELS FOR FACE DETECTION
COMPARATIVE ANALYSIS OF SKIN COLOR  BASED MODELS FOR FACE DETECTIONCOMPARATIVE ANALYSIS OF SKIN COLOR  BASED MODELS FOR FACE DETECTION
COMPARATIVE ANALYSIS OF SKIN COLOR BASED MODELS FOR FACE DETECTION
 
A PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGES
A PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGESA PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGES
A PROPOSED HSV-BASED PSEUDOCOLORING SCHEME FOR ENHANCING MEDICAL IMAGES
 
Lecnoninecolorspacemodelindigitalimageprocess
LecnoninecolorspacemodelindigitalimageprocessLecnoninecolorspacemodelindigitalimageprocess
Lecnoninecolorspacemodelindigitalimageprocess
 
Question bank for students.pdf
Question bank for students.pdfQuestion bank for students.pdf
Question bank for students.pdf
 
Study of Color Image Processing For Capturing and Comparing Images
Study of Color Image Processing For Capturing and Comparing ImagesStudy of Color Image Processing For Capturing and Comparing Images
Study of Color Image Processing For Capturing and Comparing Images
 
chapter 4.pptx
chapter 4.pptxchapter 4.pptx
chapter 4.pptx
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Color
ColorColor
Color
 
Computer graphics color models
Computer graphics    color modelsComputer graphics    color models
Computer graphics color models
 
Colorization of Gray Scale Images in YCbCr Color Space Using Texture Extract...
Colorization of Gray Scale Images in YCbCr Color Space Using  Texture Extract...Colorization of Gray Scale Images in YCbCr Color Space Using  Texture Extract...
Colorization of Gray Scale Images in YCbCr Color Space Using Texture Extract...
 
ch1ip.ppt
ch1ip.pptch1ip.ppt
ch1ip.ppt
 
Image processing report
Image processing reportImage processing report
Image processing report
 
Evaluation of Euclidean and Manhanttan Metrics In Content Based Image Retriev...
Evaluation of Euclidean and Manhanttan Metrics In Content Based Image Retriev...Evaluation of Euclidean and Manhanttan Metrics In Content Based Image Retriev...
Evaluation of Euclidean and Manhanttan Metrics In Content Based Image Retriev...
 
Color image processing ppt
Color image processing pptColor image processing ppt
Color image processing ppt
 
Id3115321536
Id3115321536Id3115321536
Id3115321536
 
Color-in-Digital-Image-Processing.pptx
Color-in-Digital-Image-Processing.pptxColor-in-Digital-Image-Processing.pptx
Color-in-Digital-Image-Processing.pptx
 
Image processing tatorial
Image processing tatorialImage processing tatorial
Image processing tatorial
 
Establishment of an Efficient Color Model from Existing Models for Better Gam...
Establishment of an Efficient Color Model from Existing Models for Better Gam...Establishment of an Efficient Color Model from Existing Models for Better Gam...
Establishment of an Efficient Color Model from Existing Models for Better Gam...
 
Basics of image processing & analysis
Basics of image processing & analysisBasics of image processing & analysis
Basics of image processing & analysis
 
Explicit Content Image Detection
Explicit Content Image DetectionExplicit Content Image Detection
Explicit Content Image Detection
 

More from Dr Amira Bibo

Steganography methods using network protocols
Steganography methods using network protocolsSteganography methods using network protocols
Steganography methods using network protocolsDr Amira Bibo
 
Supervised classification and improved filtering method for shoreline detection.
Supervised classification and improved filtering method for shoreline detection.Supervised classification and improved filtering method for shoreline detection.
Supervised classification and improved filtering method for shoreline detection.Dr Amira Bibo
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingDr Amira Bibo
 
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithmEOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithmDr Amira Bibo
 
Developing fault tolerance integrity protocol for distributed real time systems
Developing fault tolerance integrity protocol for distributed real time systemsDeveloping fault tolerance integrity protocol for distributed real time systems
Developing fault tolerance integrity protocol for distributed real time systemsDr Amira Bibo
 
Constructing sierpinski gasket using gp us arrays
Constructing sierpinski gasket using gp us arraysConstructing sierpinski gasket using gp us arrays
Constructing sierpinski gasket using gp us arraysDr Amira Bibo
 

More from Dr Amira Bibo (8)

Steganography methods using network protocols
Steganography methods using network protocolsSteganography methods using network protocols
Steganography methods using network protocols
 
Android security
Android securityAndroid security
Android security
 
Supervised classification and improved filtering method for shoreline detection.
Supervised classification and improved filtering method for shoreline detection.Supervised classification and improved filtering method for shoreline detection.
Supervised classification and improved filtering method for shoreline detection.
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithmEOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
EOE-DRTSA: end-to-end distributed real-time system scheduling algorithm
 
Developing fault tolerance integrity protocol for distributed real time systems
Developing fault tolerance integrity protocol for distributed real time systemsDeveloping fault tolerance integrity protocol for distributed real time systems
Developing fault tolerance integrity protocol for distributed real time systems
 
Constructing sierpinski gasket using gp us arrays
Constructing sierpinski gasket using gp us arraysConstructing sierpinski gasket using gp us arrays
Constructing sierpinski gasket using gp us arrays
 
Android security
Android securityAndroid security
Android security
 

Recently uploaded

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 

Recently uploaded (20)

internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 

An Investigation of Color Space Models for Steganography

  • 1. Raf. J. of Comp. & Math’s. , Vol. 7, No. 3, 2010 Third Scientific Conference Information Technology 2010 Nov. 29-30 91 An Investigation for Steganography using Different Color System Amira B. Sallow Zahraa M. Taha Ahmed S. Nori College of Computer Sciences and Mathematics University of Mosul Received on:2/9/2010 Accepted on:10/11/2010 ‫ﺍﻟ‬‫ﻤﻠﺨﺹ‬ ‫ﺘﻐ‬ ‫ﻁﺭﺍﺌﻕ‬ ‫ﺍﺴﺘﺨﺩﻤﺕ‬‫ﻤﻥ‬ ‫ﻭﺤﻤﺎﻴﺘﻬﺎ‬ ‫ﺍﻷﻫﻤﻴﺔ‬ ‫ﺫﺍﺕ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺨﺼﻭﺼﻴﺔ‬ ‫ﻋﻠﻰ‬ ‫ﻟﻠﺤﻔﺎﻅ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﻁﻴﺔ‬ ‫ﻤﻭﺜﻭﻕ‬ ‫ﻏﻴﺭ‬ ‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﺃﻭ‬ ‫ﺴﺭﻗﺔ‬ ‫ﺃﻱ‬‫ﺍﻻﻨﺘﺭﻨﻴﺕ‬ ‫ﻤﻊ‬ ‫ﺍﻟﺘﻌﺎﻤل‬ ‫ﻋﻨﺩ‬ ‫ﺨﺎﺼﺔ‬.‫ﺍﻹﺨﻔﺎﺀ‬ ‫ﺘﻘﻨﻴﺔ‬ ‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﺘﻡ‬ ،‫ﺍﻟﺒﺤﺙ‬ ‫ﻫﺫﺍ‬ ‫ﻓﻲ‬ ‫ﺃﻫﻤﻴﺔ‬ ‫ﺍﻷﻗل‬ ‫ﺍﻟﺨﺎﻨﺔ‬ ‫ﺒﻭﺍﺴﻁﺔ‬LSBLeast Significant Bit‫ﺃﻨـ‬ ‫ﻋﺩﺓ‬ ‫ﻓﻲ‬ ‫ﺍﻟﺒﻴﺎﻨﺎﺕ‬ ‫ﻤﻥ‬ ‫ﻜﺒﻴﺭﺓ‬ ‫ﻜﻤﻴﺔ‬ ‫ﻟﺘﻀﻤﻴﻥ‬‫ﻭﺍﻉ‬ ‫ﻤﺜل‬ ،‫ﺍﻟﻠﻭﻨﻴﺔ‬ ‫ﺍﻟﻨﻅﻡ‬ ‫ﻤﻥ‬)RGB, HSV, YCbCr, YIQ, YUV.( ‫ﻗﻴﻤﺔ‬ ‫ﺒﺘﺤﻭﻴل‬ ‫ﺍﻟﻔﻜﺭﺓ‬ ‫ﺘﺘﻠﺨﺹ‬RGB‫ﻤﻥ‬‫ﻀ‬‫ﹸ‬‫ﺘ‬‫ﻟ‬ ‫ﻤﻨﻔﺼﻠﺔ‬ ‫ﻤﺠﺎﻤﻴﻊ‬ ‫ﺜﻼﺙ‬ ‫ﺇﻟﻰ‬ ‫ﺍﻟﺴﺭﻴﺔ‬ ‫ﻟﻠﺭﺴﺎﻟﺔ‬ ‫ﺍﻟﻀﻭﺌﻴﺔ‬ ‫ﻟﻠﻨﻘﺎﻁ‬ ‫ﻟﻠﻐﻁﺎﺀ‬ ‫ﺍﻟﻀﻭﺌﻴﺔ‬ ‫ﺍﻟﻨﻘﺎﻁ‬ ‫ﺩﺍﺨل‬.‫ﺍﻟﻤﻘﺎﻴﻴﺱ‬ ‫ﺍﺴﺘﺨﺩﻤﺕ‬)MSE, SNR, PSNR(‫ﺍﻟﻠﻭﻨﻴـﺔ‬ ‫ﺍﻟـﻨﻅﻡ‬ ‫ﺒـﻴﻥ‬ ‫ﻟﻠﻤﻘﺎﺭﻨـﺔ‬ ‫ﻭﺍﺜ‬ ‫ﺍﻟﺒﺤﺙ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﺴﺘﺨﺩﻤﺔ‬‫ﺍﻟﻠﻭﻨﻴـﺔ‬ ‫ﺍﻟﻨﻅﻡ‬ ‫ﺫﺍﺕ‬ ‫ﺍﻟﻤﻠﻔﺎﺕ‬ ‫ﻓﻲ‬ ‫ﺍﻟﻤﻌﻠﻭﻤﺎﺕ‬ ‫ﺘﻐﻁﻴﺔ‬ ‫ﻁﺭﻴﻘﺔ‬ ‫ﺍﺴﺘﺨﺩﺍﻡ‬ ‫ﺍﻥ‬ ‫ﺍﻟﻤﻘﺎﺭﻨﺎﺕ‬ ‫ﺒﺘﺕ‬ )HIS and RGB(‫ﺍﻓﻀل‬ ‫ﻨﺘﺎﺌﺞ‬ ‫ﺘﻌﻁﻲ‬. ABSTRACT Steganographic techniques are generally used to maintain the confidentiality of valuable information and to protect it from any possible theft or unauthorized use especially over the internet. In this paper, Least Significant Bit LSB-based Steganographic techniques is used to embed large of data in different color space models, such as (RGB, HSV, YCbCr, YIQ, YUV). The idea can be summarized by transforming the RGB value of the secret image pixels into three separate components into the pixels of the cover image. The measures (MSE, SNR, PSNR) were used to compare between the color space models, the comparisons proved that steganography with color systems (RGB and HIS) shown a best results. 1. Introduction: Colors are specified for an image by using a color model. The color model’s components must be mapped to values (to generate a color space) and these values combined in a meaningful way for each pixel in the image. In English, this means for an image represented by the RGB color model, each pixel needs a red, green and blue value assignment. The purpose of color models is to organize colors in a standard form. Different models are used according to the user’s need. These models are divided in two models: hardware oriented and color manipulation. The color models include RGB, HSI, HSV, YCbCr, YIQ, CMY, CMYK Color is what you perceive when light within a certain wavelength range hits your eyes. This definition may sound a bit trite, but there is an important implication contained within: color does not exist in the physical world. Indeed, color is entirely subjective and dependent on the observer’s eyes, brain and connecting hardware; color is truly in the brain of the beholder.In other words, color is not an absolute
  • 2. Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori 92 characteristic of an object, but a human perception. The color stimulants registered by the retina of the eye are made up of the energy distribution and spectral properties of the visible light passing through or reflected by an object. color model is a mathematically consistent way of expressing colors. The mathematics of a color model allow you to express any perceived color as a combination of the components of the model. For example, a color represented in the RGB color model is a mixture of three values: a value for red, green, and blue.[1][2] 2. Color Model types 2.1 RGB color model The RGB color model is an additive color model in which Red, Green, and Blue light are added together in various ways to reproduce a broad array of colors. The name of the model comes from the initials of the three additive primary colors, Red, Green, and Blue. The main purpose of the RGB color model is for the sensing, representation, and display of images in electronic systems, such as televisions and computers, though it has also been used in conventional photography. Before the electronic age, the RGB color model already had a solid theory behind it, based in human perception of colors, See figure(1). RGB is a device-dependent color space: different devices detect or reproduce a given RGB value differently, since the color elements (such as phosphors or dyes) and their response to the individual R, G, and B levels vary from manufacturer to manufacturer, or even in the same device over time. Thus an RGB value does not define the same color across devices without some kind of color management.[3][4] R G B Figure(1): An image along with its R, G, and B components 2.2 HSL AND HSV COLOR MODEL In the HSB (Hue, Saturation , Brightness) and HSL (Hue , Saturation, Lightness) models, you specify Hue or color as an angle from 0 to 360 degrees on a color wheel, and Saturation , Brightness , and Lightness as percentages.
  • 3. An Investigation for Steganography using … 93 Saturation is the intensity of a color . at 100 percent Saturation, a color is pure; at 0 percent Saturation, the color is white , black or gray. Lightness or Brightness is the percentage of black or white that is mixed with a color. A Lightness of 100 percent will yield a white color; 0 percent is black; the pure color has a percent Lightness, See figure (2). H S V Figure(2): An image along with its H , S and V components HSL stands for Hue, Saturation, and Lightness, and is often also called HLS. HSV stands for Hue, Saturation, and value, and is also often called HSB (B for Brightness). A third model, common in computer vision applications, is HSI, for Hue, Saturation, and Intensity. Unfortunately, while typically consistent, these definitions are not standardized, and any of these abbreviations might be used for any of these three or several other related cylindrical models. HSL, HSV, HSI, or related models are often used in computer vision and image analysis for feature detection or image segmentation. The applications of such tools include object detection, for instance in robot vision; object recognition, for instance of faces, text, or license plates; content-based image retrieval; and analysis of medical images.[3][4] ( ) ( )[ ] ( ) ( )( )[ ] ( ) ( )[ ] ( )                    ++= ++ −=             −−+− −+− =    <− ≤ = = − BGRI BGR BGR S BGBRGR BRGR where GBif GBif H HSI 3 1 ,,min 3 1 2 1 cos 360 2 1 2 1 θ θ θ …(1)
  • 4. Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori 94 ( ) ( )          −= +−=         − += = Ο SIB BRIG H HS IR RGB 1 3 )60cos( )cos(* 1 …(2) 2.3 YCbCr color model YCbCr is sometimes abbreviated to YCC. Y′CbCr is often called YPbPr when used for analog component video, although the term Y′CbCr is commonly used for both systems, with or without the prime. Y′CbCr is often confused with the YUV color space, and typically the terms YCbCr and YUV are used interchangeably, leading to some confusion; when referring to signals in video or digital form, the term "YUV" mostly means "Y′CbCr", See figure (3). Y CB CR Figure(3): An image along with its Y, CB, and CR components YCbCr or Y′CbCr, sometimes written YCBCR or Y′CBCR, is a family of color spaces used as a part of the color image pipeline in video and digital photography systems. Y′ is the Luma component and CB and CR are the Blue-difference and Red- difference Chroma components. Y′ (with prime) is distinguished from Y which is luminance, meaning that light intensity is non-linearly encoded using gamma correction. Y′CbCr is not an absolute color space, it is a way of encoding RGB information. The actual color displayed depends on the actual RGB colorants used to display the signal.[2][4]                     −− −−+           =           B G R C C Y r b 214.18786.93112 112203.74797.37 966.24553.128481.65 128 128 16 …(3)                     −                     =           128 128 16 00.007910710.00456621 0.00318811-0.00153632-0.00456621 0.0062589300.00456621 r b C C Y B G R …(4)
  • 5. An Investigation for Steganography using … 95 2.4 YIQ COLOR MODEL YIQ IS THE COLOR SPACE USED BY THE NTSC COLOR TV SYSTEM, EMPLOYED MAINLY IN NORTH AND CENTRAL AMERICA, AND JAPAN. THE Y COMPONENT REPRESENTS THE LUMA INFORMATION, AND IS THE ONLY COMPONENT USED BY BLACK- AND-WHITE TELEVISION RECEIVERS. I AND Q REPRESENT THE CHROMINANCE INFORMATION, SEE FIGURE (4). [1][4][5] Y I Q Figure(4): An image along with its Y, I, and Q components The YIQ system is intended to take advantage of human color-response characteristics. The eye is more sensitive to changes in the orange-blue (I) range than in the purple-green range (Q) , therefore less bandwidth is required for Q than for I. The YIQ representation is sometimes employed in color image processing transformations. For example, applying a histogram equalization directly to the channels in an RGB image would alter the colors in relation to one another, resulting in an image with colors that no longer make sense. Instead, the histogram equalization is applied to the Y channel of the YIQ representation of the image, which only normalizes the Brightness levels of the image. The formulae approximate the conversion between the RGB color space and YIQ is as follow:                     − −−=           B G R Q I Y 311135.0522591.0211456.0 321263.0274453.0595716.0 11400.058700.029900.0 …(5)                     − −−=           Q I Y B G R 7046.111070.11 6474.02721.01 6210.09563.01 …(6)
  • 6. Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori 96 2.5 CMYK color model Unlike RGB, which is an additive color model, CMYK is a subtractive color model. Typically used in printing, CMYK assumes that the background is white, and thus subtracts the assumed Brightness of the white background from four colors: Cyan, Magenta, Yellow, and black (called “key”). Black is used because the combination of the three primary colors (CMY) doesn’t produce a fully saturated black. CMYK can produce the whole spectrum of visible colors thanks to the process of half-toning, whereby each color is assigned a Saturation level and miniscule dots of each of the three colors are printed in tiny patterns so that the human eye perceives a certain color. Like RGB, CMYK is device-dependent. There’s no straightforward formula to convert CMYK color to RGB colors or vice versa, so conversion is typically dependent upon color management systems. ColoRotate easily converts one system to the other, See figure (5). [3][4] C M Y K Figure(5): An image along with its C, M, Y and K components 2.6 YUV COLOR MODEL YUV is a color space typically used as part of a color image pipeline. It encodes a color image or video taking human perception into account, allowing reduced bandwidth for chrominance components, thereby typically enabling transmission errors or compression artifacts to be more efficiently masked by the human perception than using a "direct" RGB-representation, See figure (6).
  • 7. An Investigation for Steganography using … 97 Y U G Figure(6): An image along with its Y, U, and V components Other color spaces have similar properties, and the main reason to implement or investigate properties of Y'UV would be for interfacing with analog or digital television or photographic equipment that conforms to certain Y'UV standards. The scope of the terms Y'UV, YUV, YCbCr, YPbPr, etc., is sometimes ambiguous and overlapping. Historically, the terms YUV and Y'UV were used for a specific analog encoding of color information in television systems, while YCbCr was used for digital encoding of color information suited for video and still-image compression and transmission such as MPEG and JPEG. Today, the term YUV is commonly used in the computer industry to describe file-formats that are encoded using YCbCr. The Y'UV model defines a color space in terms of one luma (Y') and two chrominance (UV) components. The Y'UV color model is used in the NTSC, PAL, and SECAM composite color video standards. Previous black-and-white systems used only luma (Y') information. Color information (U and V) was added separately via a sub-carrier so that a black-and-white receiver would still be able to receive and display a color picture transmission in the receiver's native black-and-white format. Y' stands for the luma component (the Brightness) and U and V are the chrominance (color) components; luminance is denoted by Y and luma by Y' – the prime symbols (') denote gamma compression, with "luminance" meaning perceptual (color science) Brightness, while "luma" is electronic (voltage of display) Brightness.[4]                     −− −−=           B G R V U Y 10001.051499.061500.0 43600.028886.014713.0 11400.058700.029900.0 …(7)                     −−=           V U Y B G R 003211.21 58060.039465.01 13983.101 …(8)
  • 8. Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori 98 3. RELATED WORK § Adnan Abdul-Aziz Gutub, he use an improved technique that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels.[6 ] § Rajanikanth Reddy Koppola, he use LSB-based steganography technique to embed large amount of data in RGBA images while keeping the perceptual degradation to a minimum. And use the YIQ color space model to transform the RGB value of the secret image pixel into three separate components, which are then embedded into the least significant bits of each color pixel in the cover image. [5] § Sos S. Agaian and Juan P. Perez, they propose a steganographic approach for palette-based images. That method had the advantage of embedding secure data, within the index, the palette or both, using special sorting scheme. In the index, information can be embedded using a double pseudo random key that selects blocks and pixels within the image randomly. A stego-bit is embedded at each pixel of the selected blocks. Embedding is accomplished by selecting the closest color using a weighted distance measure that contains the desired modulus-bit. This algorithm also gives you the option of selecting the best color models (i.e. YCbCr and HSV) for embedding purposes.[7] 4. STEGANOGRAPHY Steganography is the art of hiding communication. The idea is to hide a message inside some cover media without modifying the perception of the media. As an example, many image files contain redundant information. Altering this information does not affect the visual appearance of the image. This fact can be used to create a steganographic system. By embedding a message into the redundant bits of an image, we can send secret messages by posting the images on the web. Different types of steganographic techniques have been used that employ invisible inks, microdots, character arrangement, digital signatures, covert channel, and spread spectrum communications. Electronic steganography techniques use digital ways of hiding and detecting processes. Steganography is different than cryptography and watermarking although they all have overlapping usages in the information hiding processes. Steganography security hides the knowledge that there is information in the cover medium.Watermarking is different from steganography in its main goal. Watermarking aim is to protect the cover medium from any modification with no real emphasis on secrecy. It can be observed as steganography that concentrates onhigh robustness and very low or almost no security . Steganography, in general, may have different applications. For example, steganography can be utilized for posting secret communications on the Web to avoid transmission or to hide data on the network in case of a violation. It can be useful for copyright protection, which is, in reality, digital watermarking. Copyright protection is to protect the cover medium from claiming its credit be others, with no real emphasis on secrecy. Stego Applications can involve "ownership evidence, fingerprinting, authentication and integrity verification, content labeling and protection, and usage control".[1][2][8] 5.The Proposed Hiding Algorithm In this paper ,a steganographic algorithm was designed and implemented. Besides, different color models were implemented and programmed to improve the steganographic technique that deals with all these models .
  • 9. An Investigation for Steganography using … 99 The algorithm can be summarized as: Step 1: Read color cover_image like C. Step 2: Image resize to be as secret image size (512x512) Step 3: Read binary secret _image like S. Step 4: Convert color made of C to one of the following color model. a) RGB b) YCbCr c) HSV d) YIQ e) YUV Step 5: For converting from RGB to any of these color model, We use the equations Number (1),(3),(5),(7). Step 6: Choose the best slide image from C to hide the secret image in it, and call it Z. From testing we discover that the best slide to hide for each model is: IF RGB then Z=R IF Ycbcr then Z= Cb IF HSV then Z=V IF YIQ then Z=Y IF YUV then Z=Y Step 7: [r, c] = size (Z) For i=1 to r // r = row For j=1 to c // c = column hide S(i,j) pixel in the LSB of Z (i,j) end end Step 8: Convert Z back to RGB using equation (2), (4), (6), (8). Step 9: Store the steg image. 6.The Proposed Extraction Algorithm As mensioned in the previous paragraph, here the operation working in reverse manner, so to get the secret message the steps should be in the following sequence : Step 1: Read steg image to Xc. Step 2: For converting from RGB to any of these color model, We use the equations Number (1),(3),(5),(7) Step 3: Select the slide where the secret message was hide , and call it Xz. From testing we discover that best slide to hide for each model is: IF RGB then Xz=R IF Ycbcr then Xz = Cb IF HSV then Xz =V IF YIQ then Xz =Y IF YUV then Xz =Y Step 4: [r,c] = size (Xz) For i=1 to r // r = row For j=1 to c // c = column Extract LSB of Xz(i,j) and put it A(i,j) end end Step 6: Store the secret image
  • 10. Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori 100 7. Performance Measurements To know the amount of difference between the original image and the target image(Stego-image),three kinds for performance measurements between the two images are used,which are [4][5]: 1- Mean square error or MSE is one of many ways to quantify the difference between an estimator and the true value of the quantity being estimated and it’s equation is: ( ) ( )∑∑ − = − = −= 1 0 1 0 ,_cov,_ 1 m x n y yximeryximsteg mn MSE …(9) 2- Signal-to-noise ratio (often abbreviated SNR or S/N) is a measure used in science and engineering to quantify how much a signal has been corrupted by noise. It is defined as the ratio of signal power to the noise power corrupting the signal. ( )( ) ( ) ( )( )             − = ∑∑ ∑∑ − = − = − = − = 1 0 1 0 2 1 0 1 0 2 10 ,_cov,_ ,_cov log.10 m x n y m x n y yximeryximsteg yximer SNR …(10) 3- peak signal-to-noise ratio, often abbreviated PSNR, is an engineering term for the ratio between the maximum possible power of a signal and the power of corrupting noise that affects the fidelity of its representation. ( )       = RMSE PSNR levelGrayofMax value log.20 10 …(11) MSERMSE = …(12)
  • 11. An Investigation for Steganography using … 101 8. Results See figures (7)(8)(9) and (10), also tables (1)(2)(3) and (4). Figure(7): Final Results For Applying Different Color Models Using Sample (1) Cover Image Stego Image Secret Image Extracted Secret Image RGBHSVYcbcrYIQYUV
  • 12. Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori 102 Figure(8): Final Results For Applying Different Color Models Using Sample (2) Cover Image Stego Image Secret Image Extracted Secret Image RGBHSVYcbcrYIQYUV
  • 13. An Investigation for Steganography using … 103 Figure(9): Final Results For Applying Different Color Models Using Sample (3) Cover Image Stego Image Secret Image Extracted Secret Image RGBHSVYcbcrYIQYUV
  • 14. Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori 104 Figure(10): Final Results For Applying Different Color Models Using Sample (4) Cover Image Stego Image Secret Image Extracted Secret ImageRGBHSVYcbcrYIQYUV
  • 15. An Investigation for Steganography using … 105 Table (1): comparisons between the different color models Table (2): comparisons between the different color models Images Measures RGB HSV YCBCR YIQ YUV MSE 0.132977 0.355536 0.799234 82.435430 15.241652 SNR 50.555823 46.279980 42.448595 6.470313 5.503946 PSNR 56.893054 52.621966 49.104065 28.969665 36.300483 Table (3): comparisons between the different color models Images Measures RGB HSV YCBCR YIQ YUV MSE 0.372122 0.298155 0.457161 80.338722 12.047230 SNR 46.784296 48.471867 44.468233 6.136386 6.182842 PSNR 52.423945 53.386376 51.530112 29.081554 37.321932 Images Measures RGB HSV YCBCR YIQ YUV MSE 0.132913 0.361792 0.756934 82.905178 10.963295 SNR 50.266757 45.984566 42.155010 6.028304 6.754600 PSNR 56.895131 52.546211 49.340224 28.944987 37.731393
  • 16. Amira B. Sallow , Zahraa M. Taha & Ahmed S. Nori 106 Table (4): comparisons between the different color models 9.Conclusions The imperceptibility of steganography is one of the most important measures that evaluate the performance of the steganography algorithm. The global evaluation models (MSE, SNR, and PSNR) which are widely used by most researchers were presented and used to evaluate the performance of steganography algorithm effectively. Experimental results demonstrate that our algorithm achieves high embedding capacity while preserving good image quality and high security; especially when using the color models (RGB and HSI). The important and distinctive features in the proposed method are to minimize the degradation of stego image. Images Measures RGB HSV YCBCR YIQ YUV MSE 0.137831 0.298155 0.708468 82.435430 44.943413 SNR 51.772122 48.471867 44.166045 6.470313 4.923764 PSNR 56.737323 53.386376 49.627600 28.969665 31.604143
  • 17. An Investigation for Steganography using … 107 REFERNCE [1]. Nelson, P. , 2007, “The Photographer’s Guide to Color Management: professional techniques for consistent results”, Amherst Media , Korea. [2]. Rattanapitak, W. and Udomhunsakul, S. , 2010 , “Comparative Efficiency of Color Models for Multi-focus Color Image Fusion”, Hong Kong. [3]. Cheddad, A. , Condell, J. , and Curran, K. , 2009 “A Skin Tone Detection Algorithm for an Adaptive Approach to Steganography “ , School of Computing and Intelligent Systems, Faculty of Computing and Engineering , University of Ulster, Londonderry, United Kingdom. [4]. Vaughan, T. , 2007, “ Multimedia Making it Work” seventh edition, Osborne- McGraw Hill. [5]. Koppola, R.R. , 2009 , “ A HIGH CAPACITY DATA-HIDING SCHEME IN LSB-BASED IMAGE STEGANOGRAPHY” , Master thesis , University of Akron [6]. Gutub ,A.A. , 2010 , “Pixel Indicator Technique for RGB Image Steganography” , Center of Excellence in Information Assurance (CoEIA), King Saud University, Saudi Arabia. [7]. Agaian, S.S. , and Perez , J.P. , 2004 , “NEW PIXEL SORTING METHOD FOR PALETTE BASED STEGANOGRAPHY AND COLOR MODEL SELECTION “ ,The University of Texas, San Antonio, [8]. Gonzalez, R.C. , and Woods, R.E. , 2002, “Digital Image Processing”, Prentice-Hall, USA.