SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
Volume 7, Issue 1, Ver. I (Jan. - Feb. 2017), PP 33-37
e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197
www.iosrjournals.org
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 33 | Page
A Hybrid Steganography Technique Based On LSBMR
And OPAP
Varun sangwan
Sangwan.varun@gmail.com
Abstract: This paper presents a steganography technique based on two existing methods of data hiding i.e.
LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The
center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed
data using LSBMR. The experimental results show that the proposed method provides better embedding capacity
while maintaining the good image quality. The improved performance is shown in comparison to other data hiding
methods that are investigated in this study.
Keywords: steganography, imperceptibility, least-significant-bit matching revisited (LSBMR), Optimal-pixel-
adjustment process (OPAP).
I. Introduction
The Internet has emerged as a powerful tool for communication over the past decade. It has provided an
open and connected environment to its users. Communicating over the Internet is fast and hassle-free but there are
few risks attached with it, which cannot be ignored. The biggest nightmare that surrounds the Internet today is
privacy. Privacy may be compromised whenever some confidential information is transferred from one person to
the other over this open network. To resolve this issue there is a need of a technique through which the information
can be transferred secretly. Secure communication between two entities is when the information is transferred in a
way that is insusceptible to eavesdropping. Various information hiding techniques are available that facilitate two
parties to communicate in secret.
Steganography is one such branch of data hiding. The primary goal of steganography is to conceal the
message being communicated within some cover media. The digital cover media used for this purpose can be an
image, audio, video, text etc [1]. Digital images are widely used in steganography in comparison to other available
cover media due to their high abundance on the Internet. In this paper, the cover media used is an image and the
secret data used in the form of text.
Steganography can be performed in various domains but the spatial domain techniques are more popular
than others due to their simplicity and less time complexity. In this paper, one such spatial time domain technique
has been proposed. The spatial domain methods can be divided into three categories: (i) high embedding capacity
approaches with acceptable image quality, (ii) high image quality approaches with reasonable hiding capacity and
(iii) restricted embedding capacity approaches with a slight distortion in the quality of the image.
First category of spatial domain approaches focuses on increasing the embedding capacity of cover media
[2]. Well-known least-significant-bit (LSB) substitution method lies under this category. In this method, k-LSB bits
are replaced with secret data bits. Second category of spatial domain approaches consists of adaptive
steganographic methods which makes use of the properties of human visual system (HVS) i.e. hiding more data in
edge areas and less data in smooth areas.
The third category of spatial domain approaches provides restricted embedding capacity while
maintaining high robustness against steganalysis attacks. One such technique is LSBMR that keeps the cover media
unchanged and therefore, less susceptible to attacks.
This paper, focuses on second category methods and proposes a new steganographic algorithm that makes
use of LSBMR [3] and OPAP [2] to embed secret data into grayscale cover images. This method consists of two
stages. In first stage, the cover image is partitioned into blocks of three consecutive pixels. The center pixel is
embedded with k-bits of secret data using LSB substitution and is adjusted accordingly by OPAP for data recovery
on the other side. The other two pixels are embedded with one bit each using LSBMR. In the second stage, the data
is extracted from stego image.
The remaining sections of the paper is organised as follows. In section II, the literature review is
described. In Section III, the proposed method is presented. In section IV, several experimental results are
presented to demonstrate the performance of proposed scheme. Finally, conclusions are given in Section V.
A hybrid steganography technique based on LSBMR and OPAP
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 34 | Page
II. Literature Review
2.1 PVD method
In 2003, Wu and Tsai used basic property of HVS system and presented a steganography method using
PVD [4]. This method hides different amount of secret bits in consecutive non-overlapping pixel pairs by taking
the difference value between the pixels of a pixel pair. This method partitions the given cover image into non-
overlappings blocks with two consecutive pixels, say 𝑝𝑖 and 𝑝𝑖+1 .Wu and Tsai designed a range table 𝑅𝑗 with
ranges varying from 0 to 255. The range table 𝑅𝑗 has six ranges as 𝑅1=[0,7], 𝑅2=[8,15], 𝑅3=[16,31], 𝑅4=[32,63],
𝑅5=[64,127] and 𝑅6=[128,255]. The lower bound and upper bound value of each range is given by 𝑙𝑗 and 𝑒𝑗 . Also,
the width of each range is given by 𝑅𝑗 =𝑒𝑗 βˆ’ 𝑙𝑗 + 1. The method of hiding secret data into the non-overlapping
blocks is as follows:
1. Calculate the difference value between the two pixels of each block, 𝑑𝑖 = 𝑝𝑖 βˆ’ 𝑝𝑖+1 .
2. Find the range to which the above calculated 𝑑𝑖 belongs to.
3. Compute how many bits of secret data can be embedded in each block of pixel pair, 𝑑𝑗 = π‘™π‘œπ‘”2 𝑅𝑗 .
4. Read 𝑑𝑗 bits from the binary secret data stream and covert into a decimal value 𝑠𝑖.
5. Calculate the new difference value, 𝑑𝑖
β€²
= 𝑙𝑗 + 𝑠𝑖.
6. Modify the pixels 𝑝𝑖 and 𝑝𝑖+1 as,
𝑝𝑖
β€²
, 𝑝𝑖+1
β€²
=
𝑝𝑖 +
𝑧
2
, 𝑝𝑖+1 βˆ’
𝑧
2
𝑖𝑓 𝑝𝑖 β‰₯ 𝑝𝑖+1 π‘Žπ‘›π‘‘ 𝑑𝑖
β€²
> 𝑑𝑖
𝑝𝑖 βˆ’
𝑧
2
, 𝑝𝑖+1 +
𝑧
2
𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 π‘Žπ‘›π‘‘ 𝑑𝑖
β€²
> 𝑑𝑖
𝑝𝑖 βˆ’
𝑧
2
, 𝑝𝑖+1 +
𝑧
2
𝑖𝑓 𝑝𝑖 β‰₯ 𝑝𝑖+1 π‘Žπ‘›π‘‘ 𝑑𝑖
β€²
≀ 𝑑𝑖
𝑝𝑖 +
𝑧
2
, 𝑝𝑖+1 βˆ’
𝑧
2
𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 π‘Žπ‘›π‘‘ 𝑑𝑖
β€²
≀ 𝑑𝑖
(1)
where 𝑧 = 𝑑𝑖 βˆ’ 𝑑𝑖
β€²
. This process is repeated for each of the block to obtain the stego image.
2.2 PVD and LSB replacement method
In 2005, Wu et al. proposed a steganographic method inspired by PVD technique [5]. This method
partitions the given cover image into non-overlappings blocks with two consecutive pixels, say 𝑝𝑖 and 𝑝𝑖+1. Here,
the range table 𝑅𝑗 with ranges varying from 0 to 255 is divided into β€žlower levelβ€Ÿ and β€žhigher levelβ€Ÿ. In case of
div=15, lower level contains ranges 𝑅1 =[0,7] and 𝑅2 =[8,15] while higher level contains ranges 𝑅3 =[16,31],
𝑅4=[32,63], 𝑅5=[64,127] and 𝑅6=[128,255]. The lower bound and upper bound value of each range is given by 𝑙𝑗
and 𝑒𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑒𝑗 βˆ’ 𝑙𝑗 + 1. Now, for each block difference value is
calculated as, 𝑑𝑖 = 𝑝𝑖 βˆ’ 𝑝𝑖+1 .
Case I: If the difference value 𝑑𝑖falls in the range of lower level, then LSB substitution method is used to embed 6-
bits of secret data. The procedure is as follows:
Let the 6-bits secret data is S=π‘Ž1, π‘Ž2, π‘Ž3, π‘Ž4, π‘Ž5, π‘Ž6.
1. Replace 3-LSB of 𝑝𝑖 with π‘Ž1, π‘Ž2, π‘Ž3 to obtain 𝑝𝑖
β€²
.
2. Replace 3-LSB of 𝑝𝑖+1 with π‘Ž4, π‘Ž5, π‘Ž6 to obtain 𝑝𝑖+1
β€²
.
3. Calculate the new difference value 𝑑𝑖
β€²
= 𝑝𝑖
β€²
βˆ’ 𝑝𝑖+1
β€²
.
4. If the new difference value falls in the higher level, then perform the readjusting operation.
𝑝𝑖
β€²
, 𝑝𝑖+1
β€²
=
𝑝𝑖
β€²
βˆ’ 8, 𝑝𝑖+1
β€²
+ 8 𝑖𝑓 𝑝𝑖
β€²
β‰₯ 𝑝𝑖+1
β€²
𝑝𝑖
β€²
+ 8, 𝑝𝑖+1
β€²
βˆ’ 8 𝑖𝑓 𝑝𝑖
β€²
< 𝑝𝑖+1
β€²
(2)
Case II: If the difference value 𝑑𝑖 falls in the higher level range then PVD method is used to embed secret data bits
in pixel pairs.
III. Proposed work
This section describes the proposed steganographic method for greyscale cover images. The method consists of two
phases: (i) embedding phase and (ii) extracting phase.
3.1 Embedding phase
First the cover image is partitioned into non-overlapping blocks in raster scan manner. Each block has three
consecutive pixels in which the center pixel is named as 𝑝𝑖𝑐 and the first and third pixels are 𝑝𝑖1 and 𝑝𝑖2. The
procedure of embedding data is as follows [6]:
1. Consider the k-LSBs of 𝑝𝑖𝑐 where k ∈{3,4,5,6} and transform them into a decimal value 𝐿𝑆𝐡𝑖.
A hybrid steganography technique based on LSBMR and OPAP
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 35 | Page
2. Read k-bits of secret data (i.e. k ∈{3,4,5,6}) and replace the k-LSBs of 𝑝𝑖𝑐 with these k-bits of secret data to
obtain𝑝𝑖𝑐
β€²
. Also, covert the k-secret data bits into decimal equivalent, say 𝑠𝑖𝑐 .
3. Compute the difference value, d=𝐿𝑆𝐡𝑖 βˆ’ 𝑠𝑖𝑐 .
4. Using OPAP modify the value of 𝑝𝑖𝑐′
as follows:
𝑝𝑖𝑐
β€²
=
𝑝𝑖𝑐
β€²
+ 2 π‘˜
𝑖𝑓 𝑑 > 2 π‘˜βˆ’1
π‘Žπ‘›π‘‘ 0 ≀ 𝑝𝑖𝑐
β€²
+ 2 π‘˜
≀ 255
𝑝𝑖𝑐
β€²
βˆ’ 2 π‘˜
𝑖𝑓 𝑑 < βˆ’2 π‘˜βˆ’1
π‘Žπ‘›π‘‘ 0 ≀ 𝑝𝑖𝑐
β€²
βˆ’ 2 π‘˜
≀ 255
𝑝𝑖𝑐
β€²
π‘œπ‘‘ 𝑕 π‘’π‘Ÿπ‘€π‘–π‘ π‘’
(3)
5. For data hiding in first and third pixel follow the four cases:
Case I: LSB(𝑝𝑖1) = 𝑠𝑖1& 𝑓 𝑝𝑖1, 𝑝𝑖2 = 𝑠𝑖2
𝑝𝑖1
β€²
, 𝑝𝑖2
β€²
= (𝑝𝑖1, 𝑝𝑖2)
Case II: LSB(𝑝𝑖1) = 𝑠𝑖1& 𝑓 𝑝𝑖1, 𝑝𝑖2 β‰  𝑠𝑖2
𝑝𝑖1
β€²
, 𝑝𝑖2
β€²
= (𝑝𝑖1, 𝑝𝑖2 Β± 1)
Case III: LSB(𝑝𝑖1) β‰  𝑠𝑖1& 𝑓 𝑝𝑖1 βˆ’ 1, 𝑝𝑖2 = 𝑠𝑖2
𝑝𝑖1
β€²
, 𝑝𝑖2
β€²
= (𝑝𝑖1 βˆ’ 1, 𝑝𝑖2)
Case IV: LSB(𝑝𝑖1) β‰  𝑠𝑖1& 𝑓 𝑝𝑖1 βˆ’ 1, 𝑝𝑖2 β‰  𝑠𝑖2
𝑝𝑖1
β€²
, 𝑝𝑖2
β€²
= (𝑝𝑖1 + 1, 𝑝𝑖2)
where 𝑓 𝑝𝑖1, 𝑝𝑖2 = 𝐿𝑆𝐡(
𝑝 𝑖1
2
+ 𝑝𝑖2) and 𝑠𝑖1, 𝑠𝑖2denote two secret bits to be embedded. After embedding process
new block will have pixels 𝑝𝑖1
β€²
, 𝑝𝑖𝑐
β€²
, 𝑝𝑖2
β€²
. The above procedure will be repeated for each block of cover image to
obtain the stego image.
3.2 Extracting phase
In this section the embedded data is recovered from stego image. The stego image is partitioned into non-
overlapping blocks of three pixels each. Then select the second pixel of the block first and perform the extraction
process as follows:
1. Extract the secret data bits from k-LSBs of 𝑝𝑖𝑐
β€²
and call it 𝑠𝑖𝑐 .
2. Obtain 𝑠𝑖1 and 𝑠𝑖2 using the relation,
𝑠𝑖1 = 𝐿𝑆𝐡(𝑝𝑖1
β€²
)
𝑠𝑖2 = 𝑓(𝑝𝑖1
β€²
, 𝑝𝑖2
β€²
)
Concatenate 𝑠𝑖𝑐 ,𝑠𝑖1 and 𝑠𝑖2 to obtain the original secret data bit stream. Apply the above procedure on each block to
extract the whole secret data bits.
IV. Experimental Results
This section presents the experimental results of the proposed method and compares the results with the
results of PVD method and PVD &LSB replacement method. The test images used for verifying the results are
greyscale images of size 512X512, namely β€žLenaβ€Ÿ, β€žPeppersβ€Ÿ, β€žBaboonβ€Ÿ and β€žBoatβ€Ÿ. Generally, for performance
evaluation of data hiding methods, four criteria are utilized [7]: (i) imperceptibility of stego images, (ii) the
embedding capacity, (iii) the complexity and (iv) the robustness of data embedding algorithm. The proposed
method tries to satisfy these criteria satisfactorily.
The PSNR value is used to evaluate the distortions of the stego images [8]. It can be computed as
𝑀𝑆𝐸 =
1
𝑀×𝑁
2
1 1
( ( , ) ( , ))
M N
i j
I i j Y i j
ο€½ ο€½
ο€­οƒ₯οƒ₯ (4)
𝑃𝑆𝑁𝑅 = 10π‘™π‘œπ‘”10
π‘€π‘Žπ‘₯ 2
𝑀𝑆𝐸
(5)
where MxN denotes the size of the cover image I and stego image Y. a high PSNR value means good quality of
stego image and is highly imperceptible whereas a low PSNR means the opposite. Fig. 1. shows the similarity
between cover images and its corresponding stego images and hence proves the proposed method is highly
imperceptible.
A hybrid steganography technique based on LSBMR and OPAP
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 36 | Page
Table 1. Comparisons of the results between PVD, PVD & LSB replacement and the Proposed method.
The embedding capacity of the proposed method increases as the k value increases whereas the PSNR
value decreases. The distortions occurred due to increase in embedding capacity are slight and indistinguishable.
Table 1 shows the comparison of PSNR values and embedding capacity of the proposed method with the PVD and
PVD&LSB replacement methods. Here, the proposed method performs better than the PVD method in both criteria
whereas its better than second method in PSNR value and not in terms of embedding capacity.
Generally, the methods designed in spatial domain have a low time complexity. The proposed method
falls under spatial domain and also, in this method there is no requirement of readjusting phase or knowledge of
any range table as required by PVD and PVD &LSB replacement methods. Thus, the time complexity of the
proposed method is low.
(a) (b)
Fig. 2. (a) standard cover images (b) stego images embedded with data using proposed method.
A hybrid steganography technique based on LSBMR and OPAP
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 37 | Page
Besides providing large data hiding capacity and good quality of stego image, a steganographic method
needs to be resistant against various steganalytic attacks [9],[10]. Mostly the steganalysers are based on image
histogram, therefore, if the histogram characteristics are preserved properly then there is possibility of achieving
high resistance against the well-known detectors. The proposed method maintains less changes in histogram as the
PSNR value is good and the stego image is imperceptible.
V. Conclusions
This paper has presented a hybrid steganographic technique based on LSMR and OPAP. This method can
hide large amount of secret data as well as provide an imperceptible stego image quality while compensating for
the dissimilarity between the histograms of the cover and stego images.. The efficacy of the proposed method is
verified via several experimental results that yielded better performance in comparison with PVD and PVD-LSB
replacement method.
References
[1] F. Petitcolas, R. Anderson, and M. Kuhn, β€œInformation hiding- a survey,” Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078, 1999.
[2] C.K. Chan, L.M. Cheng, β€œHiding data in image by simple LSB substitution”, pattern recognition, vol. 37, no. 3, 2004, pp. 469-474.
[3] J. Mielikainen, β€œLSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, 2006, pp. 285-287.
[4] D. C. Wu and W. H. Tsai, β€œA steganographic method for images by pixel-value-differencing,” Pattern Recognit. Lett., vol. 24, no. 9-10,
pp. 1613-1626, 2003.
[5] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, β€œImage steganographic scheme based on pixel-value-differencing and LSB
replacement methods,” Proc. Inst. Elect. Eng.,Vis. Images Signal Process., vol. 152, no. 5, pp. 611-615, 2005.
[6] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, β€œ A high quality steganographic method with pixel value differencing and
modulus function,” The Journal of Sys.and Soft., vol.81, pp. 150-158, 2008.
[7] C.-H. Yang, C.-Y. Weng, S.-J. Wang and H.-M. Sun, β€œAdaptive data hiding in edge areas of images with spatial LSB domain systems,”
IEEE Trans. Inf. Forensics Sec., vol. 3, no. 3, pp. 488-497, 2008.
[8] M. Khodaei and K. Faez, β€œNew adaptive steganographic method using least-significant-bit substitution and pixel-value differencing,”
IET Image Processing, vol. 6, iss. 6, pp. 677-686, 2012.
[9] J. Fridrich, M. Goljan, and R. Du, β€œRelaiable detection of LSB steganography in color and grayscale images,” Proc. ACM Workshop on
Multi. And Sec., pp. 61-75, 2000.
[10] A. Westfeld, A. Pfitzmann, β€œAttacks on stegographic systems”, Lecture Notes in Computer Science, vol. 1768, 2000, pp. 61-75.
[11] The USC-SIPI Image Database, http://sipi.usc.edu/database.
[12] Amit bhanwala, Mayank kumar, yogendra Kumar,” FPGA based Design of Low Power Reconfigurable Router for Network on Chip
(NoC)”, ISBN:978-1-4799-8890 Β©2015 IEEE,International Conference on Computing, Communication and Automation (ICCCA2015),
pp- 1320 - 1326, DOI: 10.1109/CCAA.2015.7148581.
[13] Mayank kumar, Kishore kumar, sanjiv kumar gupta, yogendra Kumar,” FPGA based Design of Area efficient router Architecture for
Network on Chip (NoC)”, IEEE,International Conference on Computing, Communication and Automation (ICCCA2016), pp-1600 -
1605, DOI: 10.1109/CCAA.2016.7813980.

More Related Content

What's hot

A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
Β 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
Β 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporaryprjpublications
Β 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
Β 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
Β 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Akash Rawat
Β 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
Β 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
Β 
Data Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterData Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterCSCJournals
Β 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganographyIAEME Publication
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
Β 

What's hot (13)

A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
Β 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
Β 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporary
Β 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
Β 
Az2419511954
Az2419511954Az2419511954
Az2419511954
Β 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
Β 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...
Β 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
Β 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
Β 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
Β 
Data Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterData Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity Character
Β 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
Β 

Similar to A Hybrid Steganography Technique Based On LSBMR And OPAP

An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
Β 
Id62
Id62Id62
Id62IJEEE
Β 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Β 
Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Budi Santo
Β 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
Β 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
Β 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
Β 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020Editor IJCATR
Β 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed satIAESIJEECS
Β 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
Β 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
Β 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
Β 
Substitution-diffusion based Image Cipher
Substitution-diffusion based Image CipherSubstitution-diffusion based Image Cipher
Substitution-diffusion based Image CipherIJNSA Journal
Β 

Similar to A Hybrid Steganography Technique Based On LSBMR And OPAP (20)

An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
Β 
Id62
Id62Id62
Id62
Β 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Β 
Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057
Β 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Β 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
Β 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
Β 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
Β 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
Β 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
Β 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
Β 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Β 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Β 
Substitution-diffusion based Image Cipher
Substitution-diffusion based Image CipherSubstitution-diffusion based Image Cipher
Substitution-diffusion based Image Cipher
Β 

More from IOSRJVSP

PCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewPCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewIOSRJVSP
Β 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesIOSRJVSP
Β 
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...IOSRJVSP
Β 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
Β 
Analyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAMAnalyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAMIOSRJVSP
Β 
Robust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceRobust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceIOSRJVSP
Β 
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...IOSRJVSP
Β 
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...IOSRJVSP
Β 
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...IOSRJVSP
Β 
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...IOSRJVSP
Β 
P-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWTP-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWTIOSRJVSP
Β 
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...IOSRJVSP
Β 
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...IOSRJVSP
Β 
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...IOSRJVSP
Β 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIOSRJVSP
Β 
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...IOSRJVSP
Β 
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesRetinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesIOSRJVSP
Β 
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionSpeech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionIOSRJVSP
Β 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...IOSRJVSP
Β 
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...IOSRJVSP
Β 

More from IOSRJVSP (20)

PCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewPCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-Review
Β 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Β 
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Β 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Β 
Analyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAMAnalyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAM
Β 
Robust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceRobust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory Interface
Β 
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Β 
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Β 
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Β 
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Β 
P-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWTP-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWT
Β 
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Β 
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Β 
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
Β 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
Β 
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Β 
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesRetinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
Β 
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionSpeech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Β 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Β 
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Β 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
Β 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
Β 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
Β 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
Β 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
Β 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
Β 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
Β 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
Β 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
Β 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
Β 
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
Β 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
Β 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Β 
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
young call girls in Rajiv ChowkπŸ” 9953056974 πŸ” Delhi escort Service
Β 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
Β 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Β 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Β 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
Β 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
Β 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Β 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Β 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Β 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Β 
β˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
β˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCRβ˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
β˜… CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Β 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Β 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Β 
young call girls in Green ParkπŸ” 9953056974 πŸ” escort Service
young call girls in Green ParkπŸ” 9953056974 πŸ” escort Serviceyoung call girls in Green ParkπŸ” 9953056974 πŸ” escort Service
young call girls in Green ParkπŸ” 9953056974 πŸ” escort Service
Β 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Β 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Β 
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✑️9711147426✨Call In girls Gurgaon Sector 51 escort service
Β 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
Β 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
Β 

A Hybrid Steganography Technique Based On LSBMR And OPAP

  • 1. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 7, Issue 1, Ver. I (Jan. - Feb. 2017), PP 33-37 e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197 www.iosrjournals.org DOI: 10.9790/4200-0701013337 www.iosrjournals.org 33 | Page A Hybrid Steganography Technique Based On LSBMR And OPAP Varun sangwan Sangwan.varun@gmail.com Abstract: This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study. Keywords: steganography, imperceptibility, least-significant-bit matching revisited (LSBMR), Optimal-pixel- adjustment process (OPAP). I. Introduction The Internet has emerged as a powerful tool for communication over the past decade. It has provided an open and connected environment to its users. Communicating over the Internet is fast and hassle-free but there are few risks attached with it, which cannot be ignored. The biggest nightmare that surrounds the Internet today is privacy. Privacy may be compromised whenever some confidential information is transferred from one person to the other over this open network. To resolve this issue there is a need of a technique through which the information can be transferred secretly. Secure communication between two entities is when the information is transferred in a way that is insusceptible to eavesdropping. Various information hiding techniques are available that facilitate two parties to communicate in secret. Steganography is one such branch of data hiding. The primary goal of steganography is to conceal the message being communicated within some cover media. The digital cover media used for this purpose can be an image, audio, video, text etc [1]. Digital images are widely used in steganography in comparison to other available cover media due to their high abundance on the Internet. In this paper, the cover media used is an image and the secret data used in the form of text. Steganography can be performed in various domains but the spatial domain techniques are more popular than others due to their simplicity and less time complexity. In this paper, one such spatial time domain technique has been proposed. The spatial domain methods can be divided into three categories: (i) high embedding capacity approaches with acceptable image quality, (ii) high image quality approaches with reasonable hiding capacity and (iii) restricted embedding capacity approaches with a slight distortion in the quality of the image. First category of spatial domain approaches focuses on increasing the embedding capacity of cover media [2]. Well-known least-significant-bit (LSB) substitution method lies under this category. In this method, k-LSB bits are replaced with secret data bits. Second category of spatial domain approaches consists of adaptive steganographic methods which makes use of the properties of human visual system (HVS) i.e. hiding more data in edge areas and less data in smooth areas. The third category of spatial domain approaches provides restricted embedding capacity while maintaining high robustness against steganalysis attacks. One such technique is LSBMR that keeps the cover media unchanged and therefore, less susceptible to attacks. This paper, focuses on second category methods and proposes a new steganographic algorithm that makes use of LSBMR [3] and OPAP [2] to embed secret data into grayscale cover images. This method consists of two stages. In first stage, the cover image is partitioned into blocks of three consecutive pixels. The center pixel is embedded with k-bits of secret data using LSB substitution and is adjusted accordingly by OPAP for data recovery on the other side. The other two pixels are embedded with one bit each using LSBMR. In the second stage, the data is extracted from stego image. The remaining sections of the paper is organised as follows. In section II, the literature review is described. In Section III, the proposed method is presented. In section IV, several experimental results are presented to demonstrate the performance of proposed scheme. Finally, conclusions are given in Section V.
  • 2. A hybrid steganography technique based on LSBMR and OPAP DOI: 10.9790/4200-0701013337 www.iosrjournals.org 34 | Page II. Literature Review 2.1 PVD method In 2003, Wu and Tsai used basic property of HVS system and presented a steganography method using PVD [4]. This method hides different amount of secret bits in consecutive non-overlapping pixel pairs by taking the difference value between the pixels of a pixel pair. This method partitions the given cover image into non- overlappings blocks with two consecutive pixels, say 𝑝𝑖 and 𝑝𝑖+1 .Wu and Tsai designed a range table 𝑅𝑗 with ranges varying from 0 to 255. The range table 𝑅𝑗 has six ranges as 𝑅1=[0,7], 𝑅2=[8,15], 𝑅3=[16,31], 𝑅4=[32,63], 𝑅5=[64,127] and 𝑅6=[128,255]. The lower bound and upper bound value of each range is given by 𝑙𝑗 and 𝑒𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑒𝑗 βˆ’ 𝑙𝑗 + 1. The method of hiding secret data into the non-overlapping blocks is as follows: 1. Calculate the difference value between the two pixels of each block, 𝑑𝑖 = 𝑝𝑖 βˆ’ 𝑝𝑖+1 . 2. Find the range to which the above calculated 𝑑𝑖 belongs to. 3. Compute how many bits of secret data can be embedded in each block of pixel pair, 𝑑𝑗 = π‘™π‘œπ‘”2 𝑅𝑗 . 4. Read 𝑑𝑗 bits from the binary secret data stream and covert into a decimal value 𝑠𝑖. 5. Calculate the new difference value, 𝑑𝑖 β€² = 𝑙𝑗 + 𝑠𝑖. 6. Modify the pixels 𝑝𝑖 and 𝑝𝑖+1 as, 𝑝𝑖 β€² , 𝑝𝑖+1 β€² = 𝑝𝑖 + 𝑧 2 , 𝑝𝑖+1 βˆ’ 𝑧 2 𝑖𝑓 𝑝𝑖 β‰₯ 𝑝𝑖+1 π‘Žπ‘›π‘‘ 𝑑𝑖 β€² > 𝑑𝑖 𝑝𝑖 βˆ’ 𝑧 2 , 𝑝𝑖+1 + 𝑧 2 𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 π‘Žπ‘›π‘‘ 𝑑𝑖 β€² > 𝑑𝑖 𝑝𝑖 βˆ’ 𝑧 2 , 𝑝𝑖+1 + 𝑧 2 𝑖𝑓 𝑝𝑖 β‰₯ 𝑝𝑖+1 π‘Žπ‘›π‘‘ 𝑑𝑖 β€² ≀ 𝑑𝑖 𝑝𝑖 + 𝑧 2 , 𝑝𝑖+1 βˆ’ 𝑧 2 𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 π‘Žπ‘›π‘‘ 𝑑𝑖 β€² ≀ 𝑑𝑖 (1) where 𝑧 = 𝑑𝑖 βˆ’ 𝑑𝑖 β€² . This process is repeated for each of the block to obtain the stego image. 2.2 PVD and LSB replacement method In 2005, Wu et al. proposed a steganographic method inspired by PVD technique [5]. This method partitions the given cover image into non-overlappings blocks with two consecutive pixels, say 𝑝𝑖 and 𝑝𝑖+1. Here, the range table 𝑅𝑗 with ranges varying from 0 to 255 is divided into β€žlower levelβ€Ÿ and β€žhigher levelβ€Ÿ. In case of div=15, lower level contains ranges 𝑅1 =[0,7] and 𝑅2 =[8,15] while higher level contains ranges 𝑅3 =[16,31], 𝑅4=[32,63], 𝑅5=[64,127] and 𝑅6=[128,255]. The lower bound and upper bound value of each range is given by 𝑙𝑗 and 𝑒𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑒𝑗 βˆ’ 𝑙𝑗 + 1. Now, for each block difference value is calculated as, 𝑑𝑖 = 𝑝𝑖 βˆ’ 𝑝𝑖+1 . Case I: If the difference value 𝑑𝑖falls in the range of lower level, then LSB substitution method is used to embed 6- bits of secret data. The procedure is as follows: Let the 6-bits secret data is S=π‘Ž1, π‘Ž2, π‘Ž3, π‘Ž4, π‘Ž5, π‘Ž6. 1. Replace 3-LSB of 𝑝𝑖 with π‘Ž1, π‘Ž2, π‘Ž3 to obtain 𝑝𝑖 β€² . 2. Replace 3-LSB of 𝑝𝑖+1 with π‘Ž4, π‘Ž5, π‘Ž6 to obtain 𝑝𝑖+1 β€² . 3. Calculate the new difference value 𝑑𝑖 β€² = 𝑝𝑖 β€² βˆ’ 𝑝𝑖+1 β€² . 4. If the new difference value falls in the higher level, then perform the readjusting operation. 𝑝𝑖 β€² , 𝑝𝑖+1 β€² = 𝑝𝑖 β€² βˆ’ 8, 𝑝𝑖+1 β€² + 8 𝑖𝑓 𝑝𝑖 β€² β‰₯ 𝑝𝑖+1 β€² 𝑝𝑖 β€² + 8, 𝑝𝑖+1 β€² βˆ’ 8 𝑖𝑓 𝑝𝑖 β€² < 𝑝𝑖+1 β€² (2) Case II: If the difference value 𝑑𝑖 falls in the higher level range then PVD method is used to embed secret data bits in pixel pairs. III. Proposed work This section describes the proposed steganographic method for greyscale cover images. The method consists of two phases: (i) embedding phase and (ii) extracting phase. 3.1 Embedding phase First the cover image is partitioned into non-overlapping blocks in raster scan manner. Each block has three consecutive pixels in which the center pixel is named as 𝑝𝑖𝑐 and the first and third pixels are 𝑝𝑖1 and 𝑝𝑖2. The procedure of embedding data is as follows [6]: 1. Consider the k-LSBs of 𝑝𝑖𝑐 where k ∈{3,4,5,6} and transform them into a decimal value 𝐿𝑆𝐡𝑖.
  • 3. A hybrid steganography technique based on LSBMR and OPAP DOI: 10.9790/4200-0701013337 www.iosrjournals.org 35 | Page 2. Read k-bits of secret data (i.e. k ∈{3,4,5,6}) and replace the k-LSBs of 𝑝𝑖𝑐 with these k-bits of secret data to obtain𝑝𝑖𝑐 β€² . Also, covert the k-secret data bits into decimal equivalent, say 𝑠𝑖𝑐 . 3. Compute the difference value, d=𝐿𝑆𝐡𝑖 βˆ’ 𝑠𝑖𝑐 . 4. Using OPAP modify the value of 𝑝𝑖𝑐′ as follows: 𝑝𝑖𝑐 β€² = 𝑝𝑖𝑐 β€² + 2 π‘˜ 𝑖𝑓 𝑑 > 2 π‘˜βˆ’1 π‘Žπ‘›π‘‘ 0 ≀ 𝑝𝑖𝑐 β€² + 2 π‘˜ ≀ 255 𝑝𝑖𝑐 β€² βˆ’ 2 π‘˜ 𝑖𝑓 𝑑 < βˆ’2 π‘˜βˆ’1 π‘Žπ‘›π‘‘ 0 ≀ 𝑝𝑖𝑐 β€² βˆ’ 2 π‘˜ ≀ 255 𝑝𝑖𝑐 β€² π‘œπ‘‘ 𝑕 π‘’π‘Ÿπ‘€π‘–π‘ π‘’ (3) 5. For data hiding in first and third pixel follow the four cases: Case I: LSB(𝑝𝑖1) = 𝑠𝑖1& 𝑓 𝑝𝑖1, 𝑝𝑖2 = 𝑠𝑖2 𝑝𝑖1 β€² , 𝑝𝑖2 β€² = (𝑝𝑖1, 𝑝𝑖2) Case II: LSB(𝑝𝑖1) = 𝑠𝑖1& 𝑓 𝑝𝑖1, 𝑝𝑖2 β‰  𝑠𝑖2 𝑝𝑖1 β€² , 𝑝𝑖2 β€² = (𝑝𝑖1, 𝑝𝑖2 Β± 1) Case III: LSB(𝑝𝑖1) β‰  𝑠𝑖1& 𝑓 𝑝𝑖1 βˆ’ 1, 𝑝𝑖2 = 𝑠𝑖2 𝑝𝑖1 β€² , 𝑝𝑖2 β€² = (𝑝𝑖1 βˆ’ 1, 𝑝𝑖2) Case IV: LSB(𝑝𝑖1) β‰  𝑠𝑖1& 𝑓 𝑝𝑖1 βˆ’ 1, 𝑝𝑖2 β‰  𝑠𝑖2 𝑝𝑖1 β€² , 𝑝𝑖2 β€² = (𝑝𝑖1 + 1, 𝑝𝑖2) where 𝑓 𝑝𝑖1, 𝑝𝑖2 = 𝐿𝑆𝐡( 𝑝 𝑖1 2 + 𝑝𝑖2) and 𝑠𝑖1, 𝑠𝑖2denote two secret bits to be embedded. After embedding process new block will have pixels 𝑝𝑖1 β€² , 𝑝𝑖𝑐 β€² , 𝑝𝑖2 β€² . The above procedure will be repeated for each block of cover image to obtain the stego image. 3.2 Extracting phase In this section the embedded data is recovered from stego image. The stego image is partitioned into non- overlapping blocks of three pixels each. Then select the second pixel of the block first and perform the extraction process as follows: 1. Extract the secret data bits from k-LSBs of 𝑝𝑖𝑐 β€² and call it 𝑠𝑖𝑐 . 2. Obtain 𝑠𝑖1 and 𝑠𝑖2 using the relation, 𝑠𝑖1 = 𝐿𝑆𝐡(𝑝𝑖1 β€² ) 𝑠𝑖2 = 𝑓(𝑝𝑖1 β€² , 𝑝𝑖2 β€² ) Concatenate 𝑠𝑖𝑐 ,𝑠𝑖1 and 𝑠𝑖2 to obtain the original secret data bit stream. Apply the above procedure on each block to extract the whole secret data bits. IV. Experimental Results This section presents the experimental results of the proposed method and compares the results with the results of PVD method and PVD &LSB replacement method. The test images used for verifying the results are greyscale images of size 512X512, namely β€žLenaβ€Ÿ, β€žPeppersβ€Ÿ, β€žBaboonβ€Ÿ and β€žBoatβ€Ÿ. Generally, for performance evaluation of data hiding methods, four criteria are utilized [7]: (i) imperceptibility of stego images, (ii) the embedding capacity, (iii) the complexity and (iv) the robustness of data embedding algorithm. The proposed method tries to satisfy these criteria satisfactorily. The PSNR value is used to evaluate the distortions of the stego images [8]. It can be computed as 𝑀𝑆𝐸 = 1 𝑀×𝑁 2 1 1 ( ( , ) ( , )) M N i j I i j Y i j ο€½ ο€½ ο€­οƒ₯οƒ₯ (4) 𝑃𝑆𝑁𝑅 = 10π‘™π‘œπ‘”10 π‘€π‘Žπ‘₯ 2 𝑀𝑆𝐸 (5) where MxN denotes the size of the cover image I and stego image Y. a high PSNR value means good quality of stego image and is highly imperceptible whereas a low PSNR means the opposite. Fig. 1. shows the similarity between cover images and its corresponding stego images and hence proves the proposed method is highly imperceptible.
  • 4. A hybrid steganography technique based on LSBMR and OPAP DOI: 10.9790/4200-0701013337 www.iosrjournals.org 36 | Page Table 1. Comparisons of the results between PVD, PVD & LSB replacement and the Proposed method. The embedding capacity of the proposed method increases as the k value increases whereas the PSNR value decreases. The distortions occurred due to increase in embedding capacity are slight and indistinguishable. Table 1 shows the comparison of PSNR values and embedding capacity of the proposed method with the PVD and PVD&LSB replacement methods. Here, the proposed method performs better than the PVD method in both criteria whereas its better than second method in PSNR value and not in terms of embedding capacity. Generally, the methods designed in spatial domain have a low time complexity. The proposed method falls under spatial domain and also, in this method there is no requirement of readjusting phase or knowledge of any range table as required by PVD and PVD &LSB replacement methods. Thus, the time complexity of the proposed method is low. (a) (b) Fig. 2. (a) standard cover images (b) stego images embedded with data using proposed method.
  • 5. A hybrid steganography technique based on LSBMR and OPAP DOI: 10.9790/4200-0701013337 www.iosrjournals.org 37 | Page Besides providing large data hiding capacity and good quality of stego image, a steganographic method needs to be resistant against various steganalytic attacks [9],[10]. Mostly the steganalysers are based on image histogram, therefore, if the histogram characteristics are preserved properly then there is possibility of achieving high resistance against the well-known detectors. The proposed method maintains less changes in histogram as the PSNR value is good and the stego image is imperceptible. V. Conclusions This paper has presented a hybrid steganographic technique based on LSMR and OPAP. This method can hide large amount of secret data as well as provide an imperceptible stego image quality while compensating for the dissimilarity between the histograms of the cover and stego images.. The efficacy of the proposed method is verified via several experimental results that yielded better performance in comparison with PVD and PVD-LSB replacement method. References [1] F. Petitcolas, R. Anderson, and M. Kuhn, β€œInformation hiding- a survey,” Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078, 1999. [2] C.K. Chan, L.M. Cheng, β€œHiding data in image by simple LSB substitution”, pattern recognition, vol. 37, no. 3, 2004, pp. 469-474. [3] J. Mielikainen, β€œLSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, 2006, pp. 285-287. [4] D. C. Wu and W. H. Tsai, β€œA steganographic method for images by pixel-value-differencing,” Pattern Recognit. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003. [5] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, β€œImage steganographic scheme based on pixel-value-differencing and LSB replacement methods,” Proc. Inst. Elect. Eng.,Vis. Images Signal Process., vol. 152, no. 5, pp. 611-615, 2005. [6] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, β€œ A high quality steganographic method with pixel value differencing and modulus function,” The Journal of Sys.and Soft., vol.81, pp. 150-158, 2008. [7] C.-H. Yang, C.-Y. Weng, S.-J. Wang and H.-M. Sun, β€œAdaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Sec., vol. 3, no. 3, pp. 488-497, 2008. [8] M. Khodaei and K. Faez, β€œNew adaptive steganographic method using least-significant-bit substitution and pixel-value differencing,” IET Image Processing, vol. 6, iss. 6, pp. 677-686, 2012. [9] J. Fridrich, M. Goljan, and R. Du, β€œRelaiable detection of LSB steganography in color and grayscale images,” Proc. ACM Workshop on Multi. And Sec., pp. 61-75, 2000. [10] A. Westfeld, A. Pfitzmann, β€œAttacks on stegographic systems”, Lecture Notes in Computer Science, vol. 1768, 2000, pp. 61-75. [11] The USC-SIPI Image Database, http://sipi.usc.edu/database. [12] Amit bhanwala, Mayank kumar, yogendra Kumar,” FPGA based Design of Low Power Reconfigurable Router for Network on Chip (NoC)”, ISBN:978-1-4799-8890 Β©2015 IEEE,International Conference on Computing, Communication and Automation (ICCCA2015), pp- 1320 - 1326, DOI: 10.1109/CCAA.2015.7148581. [13] Mayank kumar, Kishore kumar, sanjiv kumar gupta, yogendra Kumar,” FPGA based Design of Area efficient router Architecture for Network on Chip (NoC)”, IEEE,International Conference on Computing, Communication and Automation (ICCCA2016), pp-1600 - 1605, DOI: 10.1109/CCAA.2016.7813980.