SlideShare a Scribd company logo
1 of 6
Download to read offline
ISSN: 2312-7694 
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
107 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
A NOVEL METHOD FOR HIDING INFORMATION Samer Thaaban Abaas Al-Shibley Education College, Kufa University 
samir-alshebly@uokufa.edu.iq 
Abstract— In this paper, we introduce a new method to hide information in an image, the sequence of hiding message bits in the cover pixels and the number of bits used for hiding information are differ from one block to another and depend on the gray scale values of the pixels in the center of cover image blocks. The proposed system like all steganography system consists of two stages. The first stage used for hiding message by using two keys , the first one used for determining the sequence that will be used in hiding message pixels, while the second key used to select the number of least significant bits in the cover image that will be used in hiding information. The second stage used for extracting and retrieving message information and reconstruct the message image precisely. Keywords: Steganography, hiding information, stego image, cover. 
I. INTRODUCTION 
Steganography is the art and science of hiding information in a deterministic sequence to prevent any person from detecting the hiding Information without authentication, the secret Information is embedded in a digital file by using a suitable algorithm, there are two types of materials existing in steganography system which are the message and the carrier (cover), Message is the secret Information that should be hidden and carrier is the material that takes the message in it according to steganography algorithm and keys. The file produced after hiding the message in the cover is called stego object that translated from the source of the message to its destination. There are many applications for steganography which are military, diplomatic, and personal applications. There are three related principles that determining the effectiveness of steganography algorithm which are 
1- The size of the message file. 
2- The difficulty of detecting the message. 
3- The difficulty of altering the message by simple changing in the cover file 
Steganography can be classified into three types as illustrated in figure (1) 
II. ACCORDING TO COVER FILE TYPE 
 Text steganography. 
 Image steganography. 
 Audio steganography. 
 Video steganography. 
Image Steganography can be classified into three types 
a) Least Significant Bits (LSBs): 
 Blind hide algorithm. 
 Hide seek algorithm. 
 Filter first algorithm. 
 Battle steg algorithm. 
b) Masking and filtering techniques, take a different approach to hiding a message. These methods are effectively similar to paper watermarks, creating markings in an image. This can be achieved for example by modifying the luminance of parts of the image. While masking does change the visible properties of an image, it can be done in such a way that the human eye will not notice the anomalies. 
c) Transform Domain techniques utilize an algorithm such as the Discrete Cosine Transformation (DCT) or wavelet transformation to hide information in significant areas of the image. 
III. According to the type of the steganography key: 
 Pure steganography. 
 Secret key steganography. 
IV. PROPOSED SYSTEM 
In generl,the proposed system as illustrated in figure (2) consist of two steges, the first one is Message hiding stage and the second stage is message extracting from the stego object
ISSN: 2312-7694 
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
108 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
Steganography 
Classification according to cover file type 
Classification according to how the information has been hidden 
Classification according to the type of the key 
Line shift 
Word shift 
Feature 
Pure 
Secret Key 
Public Key 
Insertion 
Substitution 
Generation 
Text 
Image 
Audio 
Video 
Transformation 
Masking and filtering 
LSBs 
SS 
Phase 
Parity 
LSBs 
Echo 
Blind hide 
Hide seek 
Filter first 
Battle steg
ISSN: 2312-7694 
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
109 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
Figure (1) classification of steganography systems 
Message hiding stage 
Figure (2) block diagram of the proposed system 
a. message hiding stage 
this stage is divided into the following steps:- 
1- Divided cover image into non overlap blocks with size (3×3) pixels. 
2- Check the three LSBs of the pixel in the center of each block (TLSBS) . 
3- Hiding the message in each pixel in the blocks except the centers as illustrated in figure (3) to produce stego object. 
figure (3) 
1 
2 
3 
1 
2 
3 
4 
5 
6 
4 
5 
6 
7 
8 
9 
7 
8 
9 Case (1) TLSB = 0 NBITS = 2 Case (2) TLSB = 1 NBITS = 1 
9 
8 
7 
9 
8 
7 
6 
5 
4 
6 
5 
4 
3 
2 
1 
3 
2 
1 Case (3) TLSB = 2 NBITS = 2 Case (4) TLSB = 3 NBITS = 1 
7 
8 
9 
7 
8 
9 
4 
5 
6 
4 
5 
6 
1 
2 
3 
1 
2 
3 Case (5) TLSB = 4 NBITS = 2 Case (6) TLSB = 5 NBITS = 1 
3 
2 
1 
3 
2 
1 
6 
5 
4 
6 
5 
4 
9 
8 
7 
9 
8 
7 Case (7) TLSB = 6 NBITS = 2 Case (8) TLSB = 7 NBITS = 1 
Message extracting stage 
Image 
Message 
Divided into non overlap blocks with size (3×3) 
Apply inverse proposed hiding algorithm to extract message from stego image 
Stego image 
(= 0) Hiding in two bits by starting from top left corner 
Cover 
(Image) 
Message (Image) 
Divided into non overlap blocks with size (3×3) 
Check the value of three LSBs of each pixel in the center of the block 
(= 1) Hiding in one bit by starting from top left corner 
(= 2) Hiding in two bits by starting from down right corner 
(= 3) Hiding in one bit by starting from down right corner 
(= 4) Hiding in two bits by starting from down left corner 
(= 5) Hiding in one bit by starting from down left corner 
(= 6) Hiding in two bits by starting from top right corner 
(= 7) Hiding in one bit by starting from top right corner
ISSN: 2312-7694 
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
110 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
Figure (3) the direction of hiding information and number of 
bits for eight cases of variable (TLSBS) 
Where 
NBITS is the number of bits used in hiding information. 
TLSB is the value of three least significant bits. 
In addition to above operations in hiding stage, hiding 
information starting by substituting message bits in cover 
blocks with (TLSBS = 0) then in blocks with (TLSBS = 1) and 
so on. This make hiding operation progress in random fashion. 
If the message pixels are (104, 128…), this mean 
(01101000, 10000000, …….), and the cover block is 
190 
200 210 
185 202 207 
180 190 200 
TLSBS = 2, so case (3) will be applied, Then the numbers are 
represented in binary as 
202 1 1 0 0 1 0 1 0 
Values 
Before 
hiding 
2 
LSBs 
Before 
hiding 
2 
LSBs 
After 
hiding 
Values 
After 
hiding 
200 1 1 0 0 1 0 0 0 0 1 201 
190 1 0 1 1 1 1 1 0 1 0 190 
180 1 0 1 1 0 1 0 0 1 0 182 
207 1 1 0 0 1 1 1 1 0 0 204 
185 1 0 1 1 1 0 0 1 1 0 186 
210 1 1 0 1 0 0 1 0 0 0 208 
200 1 1 0 0 1 0 0 0 0 0 200 
190 1 0 1 1 1 1 1 0 0 0 188 
At the end this block becomes 
188 
200 208 
186 202 204 
182 190 201 
b. Message extracting stage 
This stage consist of the following steps 
1- Divided stego object image into non overlap blocks 
with size (3×3) pixels. 
2- Check the three LSBs of the pixel in the center of 
each block (TLSBS). 
3- Extracting the message in each pixel in the blocks 
except the centers as illustrated in figure (3). 
For the same block resulted in hiding stage the center of block 
(202) represented in binary as 
1 1 0 0 1 0 1 0 
The variable (TLSBTS= 2), so case 3 will be applied to extract 
message bits as follow 
201 1 1 0 0 1 0 0 1 
190 1 0 1 1 1 1 1 0 
182 1 0 1 1 0 1 1 0 
204 1 1 0 0 1 1 0 0 
186 1 0 1 1 1 0 1 0 
208 1 1 0 1 0 0 0 0 
200 1 1 0 0 1 0 0 0 
188 1 0 1 1 1 1 0 0 
Te message bits are ( 01 10 10 00 10 00 00 00 ) that mean 
(104, 128) 
V. RESULTS 
1- The cover image is gray scale image of size 
(552×340) pixels, while message is gray scale image 
of size (144×144) pixels, the peak signal to noise 
ratio is (47) which calculated by applying the 
following equation 
(1) 
1 
10 1 
0 
1 
0 
2 
2 
10 
[ ( , ) ( , )] 
( 1) 
log 
  
 
 
 
 
  
 n 
r 
m 
c 
peak 
g r c I r c 
l 
SNR 
n m 
Where, l is the number of gray levels in cover 
image. 
I(r,c) are the pixels before embedding process in cover 
image. 
g(r,c) are the pixels after embedding process in stego 
image. 
n,m are the width and height of cover image 
respectively. 
Figure (4) result (1) of the proposed system
ISSN: 2312-7694 
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
111 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
a- Original image b- Message c- Stego image 2- The cover image is gray scale image of size (256×384) pixels, while message is gray scale image of size (136×93) pixels, the peak signal to noise ratio is (46) Figure (5) result (2) of the proposed system a- Original image 
b - Message 
a- Stego image 
3-The cover image is gray scale image with size of (256×256) pixels, while the message is gray scale image with size of (102×102) pixels, the peak signal to noise ratio is (45.5) Figure (6) result (3) of the proposed system 
a- Original image
ISSN: 2312-7694 
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 
112 | P a g e 
© 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com 
b - Message 
b- Stego image 
VI. CONCLUSIONS 
 The size of message cannot be expected from the size of the cover image because it depends on the values of pixel in the center of the blocks. 
 The change in cover image is unnoticeable therefore peak signal to noise ratio in high rate . 
 The number of bits used in hiding information change from one block to another, the direction of hiding message bits also change from one block to another, and the blocks are not used in sequential arrange, so information may be hidden in last block before the first one in the same row, these features make this algorithm strong against the attackers. 
REFERENCES 
[1]- Eric Cole, and Ronald D. Krutz " Hiding in Plain Sight: Steganography and the Art of Covert Communication", Wiley Publishing USA, 2003. [2]- Sabu M Thampi "Information Hiding Techniques: A Tutorial Review" Department of Computer Science & Engineering LBS College of Engineering, Kasaragod Kerala, India, 2004. [3]- Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjeeand Poulami Das "A Tutorial Review on Steganography" ,University of Calcutta ,2008. [4]- Dr.M.Umamaheswari, Prof.S. Sivasubramanian, and S.Pandiarajan "Analysis of Different Steganographic Algorithms for Secured Data Hiding", IJCSNS International Journal of Computer Science and Network Security, 2010. [5]- Shrikant s. khaire, and dr.sanjay l.nalbalwar "Review: Steganography – Bit Plane Complexity Segmentation (BPCS) Technique " International Journal of Engineering Science and Technology, 2010.

More Related Content

What's hot

Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
 
Multimedia_image recognition steps
Multimedia_image recognition stepsMultimedia_image recognition steps
Multimedia_image recognition stepsNimisha T
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
00463517b1e90c1e63000000
00463517b1e90c1e6300000000463517b1e90c1e63000000
00463517b1e90c1e63000000Ivonne Liu
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013ijcsbi
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
A new steganographic approach using sudoku with digital signature
A new steganographic approach using sudoku with digital signatureA new steganographic approach using sudoku with digital signature
A new steganographic approach using sudoku with digital signatureIAEME Publication
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMijcsit
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...eSAT Publishing House
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 

What's hot (20)

Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
 
Multimedia_image recognition steps
Multimedia_image recognition stepsMultimedia_image recognition steps
Multimedia_image recognition steps
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAP
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
00463517b1e90c1e63000000
00463517b1e90c1e6300000000463517b1e90c1e63000000
00463517b1e90c1e63000000
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013Vol 1 No 1 - May 2013
Vol 1 No 1 - May 2013
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
A new steganographic approach using sudoku with digital signature
A new steganographic approach using sudoku with digital signatureA new steganographic approach using sudoku with digital signature
A new steganographic approach using sudoku with digital signature
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...Double layer security using visual cryptography and transform based steganogr...
Double layer security using visual cryptography and transform based steganogr...
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 

Viewers also liked

'Dare to dream' - storyboard
'Dare to dream' - storyboard'Dare to dream' - storyboard
'Dare to dream' - storyboardjakemichaels
 

Viewers also liked (17)

Actividad receta
Actividad recetaActividad receta
Actividad receta
 
Ahmed Hassan_2
Ahmed Hassan_2Ahmed Hassan_2
Ahmed Hassan_2
 
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
Prevention of Denial-of-Service Attack In Wireless Sensor Network via NS-2
 
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
A Learning Automata Based Prediction Mechanism for Target Tracking in Wireles...
 
Actividad receta
Actividad recetaActividad receta
Actividad receta
 
"La super-pirámide"
"La super-pirámide""La super-pirámide"
"La super-pirámide"
 
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGESCLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
CLOUD TESTING MODEL – BENEFITS, LIMITATIONS AND CHALLENGES
 
¿cómo me alimento?
¿cómo me alimento?¿cómo me alimento?
¿cómo me alimento?
 
Receta croquetas "buen provecho"
Receta croquetas "buen provecho"Receta croquetas "buen provecho"
Receta croquetas "buen provecho"
 
Analytical Survey on Bug Tracking System
Analytical Survey on Bug Tracking SystemAnalytical Survey on Bug Tracking System
Analytical Survey on Bug Tracking System
 
'Dare to dream' - storyboard
'Dare to dream' - storyboard'Dare to dream' - storyboard
'Dare to dream' - storyboard
 
Intelligent Mobile Hospital Appointment Scheduling and Medicine Collection
Intelligent Mobile Hospital Appointment Scheduling and Medicine CollectionIntelligent Mobile Hospital Appointment Scheduling and Medicine Collection
Intelligent Mobile Hospital Appointment Scheduling and Medicine Collection
 
Gabor Filter
Gabor FilterGabor Filter
Gabor Filter
 
Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...Implementing Pareto Analysis of Total Quality Management for Service Industri...
Implementing Pareto Analysis of Total Quality Management for Service Industri...
 
SCTUR: A Sentiment Classification Technique for URDU
SCTUR: A Sentiment Classification Technique for URDUSCTUR: A Sentiment Classification Technique for URDU
SCTUR: A Sentiment Classification Technique for URDU
 
Analytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANETAnalytical Study of Cluster Based Routing Protocols in MANET
Analytical Study of Cluster Based Routing Protocols in MANET
 
¿qué hay en la etiqueta?
¿qué hay en la etiqueta?¿qué hay en la etiqueta?
¿qué hay en la etiqueta?
 

Similar to A NOVEL METHOD FOR HIDING INFORMATION

SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUEijcisjournal
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyZac Darcy
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 

Similar to A NOVEL METHOD FOR HIDING INFORMATION (20)

SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUESELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
A Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and CryptographyA Novel Secure Combination Technique of Steganography and Cryptography
A Novel Secure Combination Technique of Steganography and Cryptography
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
Different Steganography Methods and Performance Analysis
Different Steganography Methods and Performance AnalysisDifferent Steganography Methods and Performance Analysis
Different Steganography Methods and Performance Analysis
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 

More from International Journal of Computer and Communication System Engineering

More from International Journal of Computer and Communication System Engineering (20)

Cloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care SystemsCloud Security Analysis for Health Care Systems
Cloud Security Analysis for Health Care Systems
 
Efficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdmaEfficient stbc for the data rate of mimo ofdma
Efficient stbc for the data rate of mimo ofdma
 
A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...A novel adaptive algorithm for removal of power line interference from ecg si...
A novel adaptive algorithm for removal of power line interference from ecg si...
 
Modified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password EncryptionModified MD5 Algorithm for Password Encryption
Modified MD5 Algorithm for Password Encryption
 
Real Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android PhonesReal Time Parking Information Provider System on Android Phones
Real Time Parking Information Provider System on Android Phones
 
An Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge LibraryAn Image-Based Bone fracture Detection Using AForge Library
An Image-Based Bone fracture Detection Using AForge Library
 
Compact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch AntennaCompact Fractal Based UWB Band Notch Antenna
Compact Fractal Based UWB Band Notch Antenna
 
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
Dynamic Key Based User Authentication (DKBUA) Framework for MobiCloud Environ...
 
An Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori AlgorithmAn Approach of Improvisation in Efficiency of Apriori Algorithm
An Approach of Improvisation in Efficiency of Apriori Algorithm
 
Cloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in BusinessCloud Computing for Exploring to Scope in Business
Cloud Computing for Exploring to Scope in Business
 
Mobile Effects on Human Body
Mobile Effects on Human BodyMobile Effects on Human Body
Mobile Effects on Human Body
 
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
Performance Analysis of WiMAX Based Vehicular Ad hoc Networks with Realistic ...
 
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
Exploratory Analysis of AI Techniques in Computer Games and Challenges faced ...
 
Feasibility Study on e-Voting System
Feasibility Study on e-Voting SystemFeasibility Study on e-Voting System
Feasibility Study on e-Voting System
 
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
Retrieval and Statistical Analysis of Genbank Data (RASA-GD)
 
Rp 3010 5814
Rp 3010 5814Rp 3010 5814
Rp 3010 5814
 
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTANSMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
SMS BASED FIRST AID TREATMENT MANAGEMENT SYSTEM FOR RURAL AREAS OF BALTISTAN
 
Analysis of Male and Female Handwriting
Analysis of Male and Female HandwritingAnalysis of Male and Female Handwriting
Analysis of Male and Female Handwriting
 
Measurement of Web Usability: An Approach
Measurement of Web Usability: An ApproachMeasurement of Web Usability: An Approach
Measurement of Web Usability: An Approach
 
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
Exploratory Analysis of Pakistan Software Industry on Quality Improvement by ...
 

Recently uploaded

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Recently uploaded (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

A NOVEL METHOD FOR HIDING INFORMATION

  • 1. ISSN: 2312-7694 Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 107 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com A NOVEL METHOD FOR HIDING INFORMATION Samer Thaaban Abaas Al-Shibley Education College, Kufa University samir-alshebly@uokufa.edu.iq Abstract— In this paper, we introduce a new method to hide information in an image, the sequence of hiding message bits in the cover pixels and the number of bits used for hiding information are differ from one block to another and depend on the gray scale values of the pixels in the center of cover image blocks. The proposed system like all steganography system consists of two stages. The first stage used for hiding message by using two keys , the first one used for determining the sequence that will be used in hiding message pixels, while the second key used to select the number of least significant bits in the cover image that will be used in hiding information. The second stage used for extracting and retrieving message information and reconstruct the message image precisely. Keywords: Steganography, hiding information, stego image, cover. I. INTRODUCTION Steganography is the art and science of hiding information in a deterministic sequence to prevent any person from detecting the hiding Information without authentication, the secret Information is embedded in a digital file by using a suitable algorithm, there are two types of materials existing in steganography system which are the message and the carrier (cover), Message is the secret Information that should be hidden and carrier is the material that takes the message in it according to steganography algorithm and keys. The file produced after hiding the message in the cover is called stego object that translated from the source of the message to its destination. There are many applications for steganography which are military, diplomatic, and personal applications. There are three related principles that determining the effectiveness of steganography algorithm which are 1- The size of the message file. 2- The difficulty of detecting the message. 3- The difficulty of altering the message by simple changing in the cover file Steganography can be classified into three types as illustrated in figure (1) II. ACCORDING TO COVER FILE TYPE  Text steganography.  Image steganography.  Audio steganography.  Video steganography. Image Steganography can be classified into three types a) Least Significant Bits (LSBs):  Blind hide algorithm.  Hide seek algorithm.  Filter first algorithm.  Battle steg algorithm. b) Masking and filtering techniques, take a different approach to hiding a message. These methods are effectively similar to paper watermarks, creating markings in an image. This can be achieved for example by modifying the luminance of parts of the image. While masking does change the visible properties of an image, it can be done in such a way that the human eye will not notice the anomalies. c) Transform Domain techniques utilize an algorithm such as the Discrete Cosine Transformation (DCT) or wavelet transformation to hide information in significant areas of the image. III. According to the type of the steganography key:  Pure steganography.  Secret key steganography. IV. PROPOSED SYSTEM In generl,the proposed system as illustrated in figure (2) consist of two steges, the first one is Message hiding stage and the second stage is message extracting from the stego object
  • 2. ISSN: 2312-7694 Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 108 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com Steganography Classification according to cover file type Classification according to how the information has been hidden Classification according to the type of the key Line shift Word shift Feature Pure Secret Key Public Key Insertion Substitution Generation Text Image Audio Video Transformation Masking and filtering LSBs SS Phase Parity LSBs Echo Blind hide Hide seek Filter first Battle steg
  • 3. ISSN: 2312-7694 Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 109 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com Figure (1) classification of steganography systems Message hiding stage Figure (2) block diagram of the proposed system a. message hiding stage this stage is divided into the following steps:- 1- Divided cover image into non overlap blocks with size (3×3) pixels. 2- Check the three LSBs of the pixel in the center of each block (TLSBS) . 3- Hiding the message in each pixel in the blocks except the centers as illustrated in figure (3) to produce stego object. figure (3) 1 2 3 1 2 3 4 5 6 4 5 6 7 8 9 7 8 9 Case (1) TLSB = 0 NBITS = 2 Case (2) TLSB = 1 NBITS = 1 9 8 7 9 8 7 6 5 4 6 5 4 3 2 1 3 2 1 Case (3) TLSB = 2 NBITS = 2 Case (4) TLSB = 3 NBITS = 1 7 8 9 7 8 9 4 5 6 4 5 6 1 2 3 1 2 3 Case (5) TLSB = 4 NBITS = 2 Case (6) TLSB = 5 NBITS = 1 3 2 1 3 2 1 6 5 4 6 5 4 9 8 7 9 8 7 Case (7) TLSB = 6 NBITS = 2 Case (8) TLSB = 7 NBITS = 1 Message extracting stage Image Message Divided into non overlap blocks with size (3×3) Apply inverse proposed hiding algorithm to extract message from stego image Stego image (= 0) Hiding in two bits by starting from top left corner Cover (Image) Message (Image) Divided into non overlap blocks with size (3×3) Check the value of three LSBs of each pixel in the center of the block (= 1) Hiding in one bit by starting from top left corner (= 2) Hiding in two bits by starting from down right corner (= 3) Hiding in one bit by starting from down right corner (= 4) Hiding in two bits by starting from down left corner (= 5) Hiding in one bit by starting from down left corner (= 6) Hiding in two bits by starting from top right corner (= 7) Hiding in one bit by starting from top right corner
  • 4. ISSN: 2312-7694 Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 110 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com Figure (3) the direction of hiding information and number of bits for eight cases of variable (TLSBS) Where NBITS is the number of bits used in hiding information. TLSB is the value of three least significant bits. In addition to above operations in hiding stage, hiding information starting by substituting message bits in cover blocks with (TLSBS = 0) then in blocks with (TLSBS = 1) and so on. This make hiding operation progress in random fashion. If the message pixels are (104, 128…), this mean (01101000, 10000000, …….), and the cover block is 190 200 210 185 202 207 180 190 200 TLSBS = 2, so case (3) will be applied, Then the numbers are represented in binary as 202 1 1 0 0 1 0 1 0 Values Before hiding 2 LSBs Before hiding 2 LSBs After hiding Values After hiding 200 1 1 0 0 1 0 0 0 0 1 201 190 1 0 1 1 1 1 1 0 1 0 190 180 1 0 1 1 0 1 0 0 1 0 182 207 1 1 0 0 1 1 1 1 0 0 204 185 1 0 1 1 1 0 0 1 1 0 186 210 1 1 0 1 0 0 1 0 0 0 208 200 1 1 0 0 1 0 0 0 0 0 200 190 1 0 1 1 1 1 1 0 0 0 188 At the end this block becomes 188 200 208 186 202 204 182 190 201 b. Message extracting stage This stage consist of the following steps 1- Divided stego object image into non overlap blocks with size (3×3) pixels. 2- Check the three LSBs of the pixel in the center of each block (TLSBS). 3- Extracting the message in each pixel in the blocks except the centers as illustrated in figure (3). For the same block resulted in hiding stage the center of block (202) represented in binary as 1 1 0 0 1 0 1 0 The variable (TLSBTS= 2), so case 3 will be applied to extract message bits as follow 201 1 1 0 0 1 0 0 1 190 1 0 1 1 1 1 1 0 182 1 0 1 1 0 1 1 0 204 1 1 0 0 1 1 0 0 186 1 0 1 1 1 0 1 0 208 1 1 0 1 0 0 0 0 200 1 1 0 0 1 0 0 0 188 1 0 1 1 1 1 0 0 Te message bits are ( 01 10 10 00 10 00 00 00 ) that mean (104, 128) V. RESULTS 1- The cover image is gray scale image of size (552×340) pixels, while message is gray scale image of size (144×144) pixels, the peak signal to noise ratio is (47) which calculated by applying the following equation (1) 1 10 1 0 1 0 2 2 10 [ ( , ) ( , )] ( 1) log          n r m c peak g r c I r c l SNR n m Where, l is the number of gray levels in cover image. I(r,c) are the pixels before embedding process in cover image. g(r,c) are the pixels after embedding process in stego image. n,m are the width and height of cover image respectively. Figure (4) result (1) of the proposed system
  • 5. ISSN: 2312-7694 Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 111 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com a- Original image b- Message c- Stego image 2- The cover image is gray scale image of size (256×384) pixels, while message is gray scale image of size (136×93) pixels, the peak signal to noise ratio is (46) Figure (5) result (2) of the proposed system a- Original image b - Message a- Stego image 3-The cover image is gray scale image with size of (256×256) pixels, while the message is gray scale image with size of (102×102) pixels, the peak signal to noise ratio is (45.5) Figure (6) result (3) of the proposed system a- Original image
  • 6. ISSN: 2312-7694 Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE) 112 | P a g e © 2014, IJCCSE All Rights Reserved Vol. 1 No.03 October 2014 www.ijccse.com b - Message b- Stego image VI. CONCLUSIONS  The size of message cannot be expected from the size of the cover image because it depends on the values of pixel in the center of the blocks.  The change in cover image is unnoticeable therefore peak signal to noise ratio in high rate .  The number of bits used in hiding information change from one block to another, the direction of hiding message bits also change from one block to another, and the blocks are not used in sequential arrange, so information may be hidden in last block before the first one in the same row, these features make this algorithm strong against the attackers. REFERENCES [1]- Eric Cole, and Ronald D. Krutz " Hiding in Plain Sight: Steganography and the Art of Covert Communication", Wiley Publishing USA, 2003. [2]- Sabu M Thampi "Information Hiding Techniques: A Tutorial Review" Department of Computer Science & Engineering LBS College of Engineering, Kasaragod Kerala, India, 2004. [3]- Samir K Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjeeand Poulami Das "A Tutorial Review on Steganography" ,University of Calcutta ,2008. [4]- Dr.M.Umamaheswari, Prof.S. Sivasubramanian, and S.Pandiarajan "Analysis of Different Steganographic Algorithms for Secured Data Hiding", IJCSNS International Journal of Computer Science and Network Security, 2010. [5]- Shrikant s. khaire, and dr.sanjay l.nalbalwar "Review: Steganography – Bit Plane Complexity Segmentation (BPCS) Technique " International Journal of Engineering Science and Technology, 2010.