SlideShare a Scribd company logo
1 of 3
Download to read offline
Journal for Research | Volume 02 | Issue 04 | June 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 9
Image Steganography using Block Level Entropy
Thresholding Technique
Souma Pal Prof. Samir Kumar Bandyopadhyay
Research Scholar Professor
Department of Computer Science & Engineering Department of Computer Science & Engineering
University of Calcutta, West Bengal, India University of Calcutta, West Bengal, India
Abstract
Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible
by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide
information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret
message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium.
Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the
sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the
existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so
on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique.
Keywords: Steganography, Cryptography, Data hiding, Entropy
_______________________________________________________________________________________________________
I. INTRODUCTION
The information hiding system uses two algorithms: embedding algorithm and extraction algorithm. The embedding algorithm
hides the information which is to be kept secret within a cover image in such a way that no one else than the sender and receiver
can understand the existence of the secret message and finally produces the stego-image. The extraction algorithm retrieves the
original message from stego-image by omitting the irrelevant or redundant information presence in the cover image. There are
two kinds of steganographic techniques: spatial domain and frequency domain.
Spatial/Time Domain:A.
Spatial domain techniques embed messages in the intensity of the pixels directly. Least Significant Bit (LSB) is the first most
famous and easy spatial domain Steganography technique. It embeds the bits of a message in a sequential way in the LSB of the
image pixels but the problem of this technique is that if the image is compressed then the embedded data may be destroyed [1].
Thus, there is a fear for damage of the message that may have sensitive information. Moreover, these kinds of methods are easy
to attack by Steganalysis techniques.
Transform/Frequency Domain:B.
Transform domain technique is done with a set of transform coefficients(DCT,entropy ) in the mid frequency bands as these are
preserved better under compression attacks as compared to high frequency coefficients [7]. Transform domain technique
performs well against attacks such as compression, cropping etc. and is imperceptible to human sensory system. Hence it is more
undetectable and robust than spatial domain.
This paper highlights the transform domain method. The cover image is splitted into non-overlapping 8x8 blocks and DCT
(discrete cosine transforms) is computed for each block. Data embedding is done in the transform domain with a set of transform
coefficients in the mid frequency bands as these are preserved better under compression attacks as compared to high frequency
coefficients. In this paper, entropy property of an image block is considered for decision of data embedding. Two methods for
applying local criteria which results in high volume data hiding are considered. First is the block level Entropy Thresholding
(ET) method which decides whether or not to embed data in each block (typically 8X8) of transform coefficients depending on
the entropy within that block. If a particular block fails this test, we keep it as it is and embed the same data in the next block that
passes the test. The second is selectively Embedding in Coefficients (SEC) method, which decides whether or not to embed data
based on the magnitude of the coefficient.
II. REVIEW WORKS
Steganalysis is the art of how to detect the existence of hidden information or hidden message in a multimedia document, and to
discriminate stego object and non-stego-object with little or no knowledge about the steganography algorithm. The goal of
steganalysis is to collect any evidence about the presence of embedded message [1]. If the steganography is the art of hiding
messages into multimedia documents; the steganalysis is the art of detecting such the hidden messages. A message can be hidden
Image Steganography using Block Level Entropy Thresholding Technique
(J4R/ Volume 02 / Issue 04 / 03)
All rights reserved by www.journalforresearch.org 10
in a document only if the content of a document has high redundancy [2]. Although the embedded message changes the
characteristics and nature of the document, it is required that these changes are difficult to be identified by an unsuspecting user.
On the other hand, steganalysis develops theories, methods and techniques that can be used to detect hidden messages in
multimedia documents. The documents without any hidden messages or hidden information are called cover documents and the
documents with hidden messages are named stego documents [3][4]. The multimedia document may be text, image, audio or
video, this paper will concentrate on the image. Also stego document or stego object in this paper will be the stego image which
is the image with hidden message or hidden information, and the cover document or cover object is the cover image which is the
original image without and hidden message. The primary step of steganography and steganalysis process is to identify the image
that the secret message will be hidden in, which will called cover image, then use any steganography algorithm to embed the
message in the cover image, sometimes by the help of secret key, so the cover image become stego image as shown in Figure 1.
After that steganalysis process determines whether that image contains hidden message or not and then try to recover the
message from it. In the cryptanalysis it is clear that the intercepted message is encrypted and it certainly contains the hidden
message because the message is scrambled. But this may not be true in the case of steganalysis. The stego image may or may not
be with hidden message. The steganalysis process starts with a set of unknown information streams. Then the set is reduced with
the help of advanced statistical methods [5]. Siva Jana Kiraman et.al [6] proposed a gray block embedding method, in this
method the LSB bits are modified based on the MSB bit plane. In the embedding process the gray image is divided into the 4*4
blocks further this is divided into 2*2 blocks. The embedding process is done in 2 phase outer embedding and the inner
embedding. In the outer a reference point is found in each of the 2*2 blocks and base o the MSB bit plane of then reference point
in the 2*2 block the secret data is embedded into the other pixels. In the inner embedding the values of the reference point has
been changed to increase the security. In the extracting process the reference point value are bought back and based on the
reference point value the actual value are extracted from the stego image. The proposed scheme increases the embedding
capacity and security by the complexity. Prabakaran G et.al [7] aims to develop a Steganography scheme to secure the medical
digital images. The proposed method is based on the integer wavelet transform and the Arnold transform. In the embedding
process the container image is taken and the flip left is applied, a dummy container image is obtained. The patient‟s medical
image is taken and the Arnold transform is applied and scrambled secret image is obtained. This scrambled secret image was
embedded into the dummy container image and the inverse IWT was taken to get dummy secret image. This dummy secret
image is embedded into the container image and transferred to receiver. The reverse with sub band subtraction is applied to get
the actual data in extraction phase. The algorithm increases the capacity and the quality. Vn Mai et.al [8] proposed a
Steganography scheme to have control over the access of the data stored in the ECG (Electrocardiogram). The scheme requires
that the patient‟s data to be stored in a tree structure which consists of leaf node and branch and each node represents a kind of
data. Each leaf node or a branch is protected from access by Steganographic keys. The normal Steganography algorithm is used
to embed data into ECG. Once data is embedded the data is stored in the public cloud and the data owner can upload some access
keys and the interested users can request for keys to cloud server and retrieve some information and if there are some restricted
data then the key has to be obtained from owner itself. In the extraction process the user key is compared with the key file on the
cloud and only if the key matches the access is allowed. Confidentiality of the patient‟s information is maintained.
III. PROPOSED METHOD
Embedding Procedure:A.
 At first, a cover image C (JPEG) is partitioned into non overlapping blocks of 8X8 pixels.DCT is computed for each
block into DCT coefficients.
 To find embedding region first Compute entropy (E) of all 8x8 DCT blocks. Entropy formula is E= | Xi,j |^2 𝑖,𝑗 (i,j)
≠(0,0).
 Then calculate Mean Entropy (ME) from all blocks entropy.
 Now, to obtain the valid block (VB), compare the entropy of each block with mean entropy (ME). For embedding the
information, a block having entropy higher than the mean entropy value is selected and is named as valid block.
 Middle coefficients of K Matrix for each valid block are one‟s and other coefficients are zero this is because our secret
message will be embedded in the middle-frequency part of the quantized DCT coefficients matrix say k. In k matrix
there are 26 coefficients located in the middle part that are set to be one. Here K[a,b] is the value of the ath row and bth
column element of K .
 Based on this table, the secret messages can be reserved and the reconstructed Image will not be too much distorted.
The secret image S will be embedded in the middle frequency part of the DCT coefficients for valid block Vb.
 After embedding the secret image IDCT is computed for all blocks. The blocks which are not used for embedding are
taken as it is in stego image. At the end, add DC coefficient of each block in its respective block and organize all the
blocks to get image, which is called stego image Stego (i, j).
Extraction Procedure:B.
 While extracting the secret data,the said embedding steps are repeated for stego image.
Image Steganography using Block Level Entropy Thresholding Technique
(J4R/ Volume 02 / Issue 04 / 03)
All rights reserved by www.journalforresearch.org 11
 Extract 26 mid frequency Bit information (BI) from Valid Coefficient of all Valid Block in zigzag order of stego image.
 Then we order the extracted BI.
 Finally decode the image information and acquire input secret image file S.
IV. RESULT
Several experiments are performed to evaluate our proposed methods. Eleven grayscale images with size 512 · 512 are used in
the experiments as cover images namely „Lena‟, ‟Baboon‟, ‟Peppers‟, ‟F16‟, ‟Boat‟, ‟Man‟, ‟Tiffany‟, ‟Barbara‟, ‟Elaine‟,
‟Couple‟, ‟Splash‟, and are shown in Fig. 1. The proposed schemes have been implemented using the MATLAB 7.8.0.347
(R2009a) program on Windows XP platform.
Fig. 1: Eleven cover images are used for the proposed schemes
V. CONCLUSION
The cover image is taken as a graysacle image of 256X256 pixels for experiment. The secret message is embedded in the middle
frequency part of the DCT coefficients. The PSNR (decibel format) and MSE are used as measurement of the quality of image
coding and compression. If PSNR is high then images are best quality. This method provides acceptable image quality and
highly robust system.
REFERENCES
[1] Manveer Kaur1, Gagandeep Kaur2, 2014,” Review of Various Steganalysis Techniques”, International Journal of Computer Science and Information
Technologies, Vol.5 (2).
[2] Natarajan Meghanathan, Lopamudra Nayak, January 2010, "STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN
IMAGE, AUDIO AND VIDEO COVER MEDIA”, International Journal of Network Security & Its Application (IJNSA).
[3] Dr.P.Sujatha, Dr.S.Purushothaman, P.Rajeswari, January 2014, “Computational Complexity Evaluation of ANN Algorithms for Image Steganalysis”,
International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 3 Issue 3.
[4] Manu Devi, Ms. Nidhi Sharma, August, 2013, “Improvements of Steganography Parameter in Binary Images and JPEG Images against Steganalysis”,
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY.
[5] Krati vyas1, B.L.Pal, January 2014 , “A PROPOSED METHOD IN IMAGE STEGANOGRAPHY TO IMPROVE IMAGE QUALITY WITH LSB
TECHNIQUE”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 1.
[6] Siva Janakiraman, Suriya.N, Nithiya.V, Badrinath Radhakrishnan, Janani Ramanathan and Rengarajan Amirtharajan, " Reflective Code for Gray Block
Embedding," Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering,IEEE, pp: 215-220, 2012.
[7] Prabakaran G, Dr. Bhavani R and Rajeswari P. S, “Multi Secure and Robustness for Medical Image Based Steganography Scheme”, International
Conference on Circuits, Power and Computing Technologies [ICCPCT-], IEEE, and pp: 1188-1193, 2013.
[8] Vu Mai, Ibrahim Khalil, Ayman Ibaida, “Steganography-based Access Control to Medical Data Hidden in Electrocardiogram”, 35th Annual International
Conference of the IEEE EMBS, pp: 1302-1305, 2013.

More Related Content

What's hot

Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer ForensicsIJCSIS Research Publications
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.CSCJournals
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Enhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio SteganographyEnhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio Steganographyijceronline
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewCSCJournals
 

What's hot (15)

Image encryption
Image encryptionImage encryption
Image encryption
 
Bi34381384
Bi34381384Bi34381384
Bi34381384
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Digital Steganography in Computer Forensics
 Digital Steganography in Computer Forensics Digital Steganography in Computer Forensics
Digital Steganography in Computer Forensics
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.Customized and Secure Image Steganography Through Random Numbers Logic.
Customized and Secure Image Steganography Through Random Numbers Logic.
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Enhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio SteganographyEnhanced Secret Communication Using Multilevel Audio Steganography
Enhanced Secret Communication Using Multilevel Audio Steganography
 
Image Steganography Techniques: An Overview
Image Steganography Techniques: An OverviewImage Steganography Techniques: An Overview
Image Steganography Techniques: An Overview
 

Viewers also liked

STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...
STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...
STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...Journal For Research
 
COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...
COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...
COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...Journal For Research
 
STUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVE
STUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVESTUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVE
STUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVEJournal For Research
 
MATHEMATICAL MODELING OF PLASTICS INJECTION MOULD
MATHEMATICAL MODELING OF PLASTICS INJECTION MOULDMATHEMATICAL MODELING OF PLASTICS INJECTION MOULD
MATHEMATICAL MODELING OF PLASTICS INJECTION MOULDJournal For Research
 
CRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURE
CRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURECRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURE
CRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTUREJournal For Research
 
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...Journal For Research
 
ADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFER
ADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFERADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFER
ADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFERJournal For Research
 
THE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCE
THE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCETHE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCE
THE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCEJournal For Research
 
SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...
SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...
SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...Journal For Research
 
CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...
CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...
CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...Journal For Research
 
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURE
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURECLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURE
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZUREJournal For Research
 
POTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERS
POTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERSPOTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERS
POTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERSJournal For Research
 
DESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREEN
DESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREENDESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREEN
DESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREENJournal For Research
 
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHGRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHJournal For Research
 
OBJECT DETECTION AND RECOGNITION: A SURVEY
OBJECT DETECTION AND RECOGNITION: A SURVEYOBJECT DETECTION AND RECOGNITION: A SURVEY
OBJECT DETECTION AND RECOGNITION: A SURVEYJournal For Research
 
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUESAUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUESJournal For Research
 
AN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATION
AN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATIONAN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATION
AN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATIONJournal For Research
 
IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...
IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...
IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...Journal For Research
 

Viewers also liked (20)

STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...
STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...
STUDY OF GROUND WATER QUALITY OF ARSIKERE TOWN AND SURROUNDING AREAS, HASSAN,...
 
AUTOMATIC SORTING MACHINE
AUTOMATIC SORTING MACHINEAUTOMATIC SORTING MACHINE
AUTOMATIC SORTING MACHINE
 
COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...
COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...
COMPARATIVE STUDY OF COMPRESSIVE STRENGTH AND DURABILITY PROPERTIES ON GEOPOL...
 
STUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVE
STUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVESTUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVE
STUDY AND ANALYSIS OF DIFFERENTIAL CONTROLLED CONTINUOUSLY VARIABLE DRIVE
 
MATHEMATICAL MODELING OF PLASTICS INJECTION MOULD
MATHEMATICAL MODELING OF PLASTICS INJECTION MOULDMATHEMATICAL MODELING OF PLASTICS INJECTION MOULD
MATHEMATICAL MODELING OF PLASTICS INJECTION MOULD
 
CRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURE
CRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURECRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURE
CRACK DETECTION AND CLASSIFICATION IN CONCRETE STRUCTURE
 
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
A NOVEL WEB IMAGE RE-RANKING APPROACH BASED ON QUERY SPECIFIC SEMANTIC SIGNAT...
 
ADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFER
ADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFERADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFER
ADVANCED OPTIMIZATION CIRCUIT FOR WIRELESS POWER TRANSFER
 
THE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCE
THE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCETHE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCE
THE EFFECT OF VENTURI DESIGN ON JET PUMP PERFORMANCE
 
SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...
SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...
SIMULATION ANALYSIS OF CLOSED LOOP DUAL INDUCTOR CURRENT-FED PUSH-PULL CONVER...
 
CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...
CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...
CHARACTERIZATION & DURABILITY PROPERTIES OF ULTRAFINE FLY ASH BASED GEOPOLYME...
 
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURE
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURECLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURE
CLOUD ANALYTICS: AN INSIGHT ON DATA AND STORAGE SERVICES IN MICROSOFT AZURE
 
POTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERS
POTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERSPOTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERS
POTENTIAL IN INDIA FOR USE OF SOLAR PV IN CHARGING OF ELECTRIC 2 & 3-WHEELERS
 
DESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREEN
DESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREENDESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREEN
DESIGN AND IMPLEMENTATION OF CAMERA-BASED INTERACTIVE TOUCH SCREEN
 
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACHGRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
GRAY SCALE IMAGE SEGMENTATION USING OTSU THRESHOLDING OPTIMAL APPROACH
 
OBJECT DETECTION AND RECOGNITION: A SURVEY
OBJECT DETECTION AND RECOGNITION: A SURVEYOBJECT DETECTION AND RECOGNITION: A SURVEY
OBJECT DETECTION AND RECOGNITION: A SURVEY
 
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUESAUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
AUTOMATED BUG TRIAGE USING ADVANCED DATA REDUCTION TECHNIQUES
 
GREENHOUSE CULTIVATION
GREENHOUSE CULTIVATIONGREENHOUSE CULTIVATION
GREENHOUSE CULTIVATION
 
AN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATION
AN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATIONAN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATION
AN ACTIVE PFC WITH FLYBACK DESIGN FOR INTELLIGENCE IN STREET LIGHT APPLICATION
 
IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...
IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...
IMPLEMENTATION OF LEAN MANUFACTURING TOOLS FOR IMPROVING PRODUCTIVITY: A CASE...
 

Similar to IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE

A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniquestheijes
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...eSAT Journals
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION acijjournal
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyMonica Turner
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.comIJERD Editor
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)JIEMS Akkalkuwa
 

Similar to IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE (20)

Bp34412415
Bp34412415Bp34412415
Bp34412415
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Stegonoraphy
StegonoraphyStegonoraphy
Stegonoraphy
 
D010312230
D010312230D010312230
D010312230
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...Analysis of image steganalysis techniques to defend against statistical attac...
Analysis of image steganalysis techniques to defend against statistical attac...
 
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
TWO PHASE CLANDESTAIN IMAGE ENCRYPTION
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
H017255560
H017255560H017255560
H017255560
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Image Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image SteganographyImage Steganography. Image Steganography. Image Steganography
Image Steganography. Image Steganography. Image Steganography
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 

More from Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 

IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE

  • 1. Journal for Research | Volume 02 | Issue 04 | June 2016 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 9 Image Steganography using Block Level Entropy Thresholding Technique Souma Pal Prof. Samir Kumar Bandyopadhyay Research Scholar Professor Department of Computer Science & Engineering Department of Computer Science & Engineering University of Calcutta, West Bengal, India University of Calcutta, West Bengal, India Abstract Our modern civilization is based on Internet and sometimes it is required to keep the communication secret. It becomes possible by using two techniques: Cryptography and Steganography. The key concept behind both of two approaches is to hide information in anyway. There is little difference of these two approaches. Cryptography conceals the content of the secret message whereas Steganography is more advanced concept of the former. It embeds the secret message within a cover medium. Steganography is art and science in which the secret message is embedded into a cover medium so that no one else than the sender and the recipient can suspect it. So the third parties except the sender and receiver are imperceptible and unaware of the existence of the secret message. There are so many efficient Steganographic techniques like that text, image, audio, video and so on. This paper proposes only Image Steganographic method using Block Level Entropy Thresholding Technique. Keywords: Steganography, Cryptography, Data hiding, Entropy _______________________________________________________________________________________________________ I. INTRODUCTION The information hiding system uses two algorithms: embedding algorithm and extraction algorithm. The embedding algorithm hides the information which is to be kept secret within a cover image in such a way that no one else than the sender and receiver can understand the existence of the secret message and finally produces the stego-image. The extraction algorithm retrieves the original message from stego-image by omitting the irrelevant or redundant information presence in the cover image. There are two kinds of steganographic techniques: spatial domain and frequency domain. Spatial/Time Domain:A. Spatial domain techniques embed messages in the intensity of the pixels directly. Least Significant Bit (LSB) is the first most famous and easy spatial domain Steganography technique. It embeds the bits of a message in a sequential way in the LSB of the image pixels but the problem of this technique is that if the image is compressed then the embedded data may be destroyed [1]. Thus, there is a fear for damage of the message that may have sensitive information. Moreover, these kinds of methods are easy to attack by Steganalysis techniques. Transform/Frequency Domain:B. Transform domain technique is done with a set of transform coefficients(DCT,entropy ) in the mid frequency bands as these are preserved better under compression attacks as compared to high frequency coefficients [7]. Transform domain technique performs well against attacks such as compression, cropping etc. and is imperceptible to human sensory system. Hence it is more undetectable and robust than spatial domain. This paper highlights the transform domain method. The cover image is splitted into non-overlapping 8x8 blocks and DCT (discrete cosine transforms) is computed for each block. Data embedding is done in the transform domain with a set of transform coefficients in the mid frequency bands as these are preserved better under compression attacks as compared to high frequency coefficients. In this paper, entropy property of an image block is considered for decision of data embedding. Two methods for applying local criteria which results in high volume data hiding are considered. First is the block level Entropy Thresholding (ET) method which decides whether or not to embed data in each block (typically 8X8) of transform coefficients depending on the entropy within that block. If a particular block fails this test, we keep it as it is and embed the same data in the next block that passes the test. The second is selectively Embedding in Coefficients (SEC) method, which decides whether or not to embed data based on the magnitude of the coefficient. II. REVIEW WORKS Steganalysis is the art of how to detect the existence of hidden information or hidden message in a multimedia document, and to discriminate stego object and non-stego-object with little or no knowledge about the steganography algorithm. The goal of steganalysis is to collect any evidence about the presence of embedded message [1]. If the steganography is the art of hiding messages into multimedia documents; the steganalysis is the art of detecting such the hidden messages. A message can be hidden
  • 2. Image Steganography using Block Level Entropy Thresholding Technique (J4R/ Volume 02 / Issue 04 / 03) All rights reserved by www.journalforresearch.org 10 in a document only if the content of a document has high redundancy [2]. Although the embedded message changes the characteristics and nature of the document, it is required that these changes are difficult to be identified by an unsuspecting user. On the other hand, steganalysis develops theories, methods and techniques that can be used to detect hidden messages in multimedia documents. The documents without any hidden messages or hidden information are called cover documents and the documents with hidden messages are named stego documents [3][4]. The multimedia document may be text, image, audio or video, this paper will concentrate on the image. Also stego document or stego object in this paper will be the stego image which is the image with hidden message or hidden information, and the cover document or cover object is the cover image which is the original image without and hidden message. The primary step of steganography and steganalysis process is to identify the image that the secret message will be hidden in, which will called cover image, then use any steganography algorithm to embed the message in the cover image, sometimes by the help of secret key, so the cover image become stego image as shown in Figure 1. After that steganalysis process determines whether that image contains hidden message or not and then try to recover the message from it. In the cryptanalysis it is clear that the intercepted message is encrypted and it certainly contains the hidden message because the message is scrambled. But this may not be true in the case of steganalysis. The stego image may or may not be with hidden message. The steganalysis process starts with a set of unknown information streams. Then the set is reduced with the help of advanced statistical methods [5]. Siva Jana Kiraman et.al [6] proposed a gray block embedding method, in this method the LSB bits are modified based on the MSB bit plane. In the embedding process the gray image is divided into the 4*4 blocks further this is divided into 2*2 blocks. The embedding process is done in 2 phase outer embedding and the inner embedding. In the outer a reference point is found in each of the 2*2 blocks and base o the MSB bit plane of then reference point in the 2*2 block the secret data is embedded into the other pixels. In the inner embedding the values of the reference point has been changed to increase the security. In the extracting process the reference point value are bought back and based on the reference point value the actual value are extracted from the stego image. The proposed scheme increases the embedding capacity and security by the complexity. Prabakaran G et.al [7] aims to develop a Steganography scheme to secure the medical digital images. The proposed method is based on the integer wavelet transform and the Arnold transform. In the embedding process the container image is taken and the flip left is applied, a dummy container image is obtained. The patient‟s medical image is taken and the Arnold transform is applied and scrambled secret image is obtained. This scrambled secret image was embedded into the dummy container image and the inverse IWT was taken to get dummy secret image. This dummy secret image is embedded into the container image and transferred to receiver. The reverse with sub band subtraction is applied to get the actual data in extraction phase. The algorithm increases the capacity and the quality. Vn Mai et.al [8] proposed a Steganography scheme to have control over the access of the data stored in the ECG (Electrocardiogram). The scheme requires that the patient‟s data to be stored in a tree structure which consists of leaf node and branch and each node represents a kind of data. Each leaf node or a branch is protected from access by Steganographic keys. The normal Steganography algorithm is used to embed data into ECG. Once data is embedded the data is stored in the public cloud and the data owner can upload some access keys and the interested users can request for keys to cloud server and retrieve some information and if there are some restricted data then the key has to be obtained from owner itself. In the extraction process the user key is compared with the key file on the cloud and only if the key matches the access is allowed. Confidentiality of the patient‟s information is maintained. III. PROPOSED METHOD Embedding Procedure:A.  At first, a cover image C (JPEG) is partitioned into non overlapping blocks of 8X8 pixels.DCT is computed for each block into DCT coefficients.  To find embedding region first Compute entropy (E) of all 8x8 DCT blocks. Entropy formula is E= | Xi,j |^2 đť‘–,đť‘— (i,j) ≠(0,0).  Then calculate Mean Entropy (ME) from all blocks entropy.  Now, to obtain the valid block (VB), compare the entropy of each block with mean entropy (ME). For embedding the information, a block having entropy higher than the mean entropy value is selected and is named as valid block.  Middle coefficients of K Matrix for each valid block are one‟s and other coefficients are zero this is because our secret message will be embedded in the middle-frequency part of the quantized DCT coefficients matrix say k. In k matrix there are 26 coefficients located in the middle part that are set to be one. Here K[a,b] is the value of the ath row and bth column element of K .  Based on this table, the secret messages can be reserved and the reconstructed Image will not be too much distorted. The secret image S will be embedded in the middle frequency part of the DCT coefficients for valid block Vb.  After embedding the secret image IDCT is computed for all blocks. The blocks which are not used for embedding are taken as it is in stego image. At the end, add DC coefficient of each block in its respective block and organize all the blocks to get image, which is called stego image Stego (i, j). Extraction Procedure:B.  While extracting the secret data,the said embedding steps are repeated for stego image.
  • 3. Image Steganography using Block Level Entropy Thresholding Technique (J4R/ Volume 02 / Issue 04 / 03) All rights reserved by www.journalforresearch.org 11  Extract 26 mid frequency Bit information (BI) from Valid Coefficient of all Valid Block in zigzag order of stego image.  Then we order the extracted BI.  Finally decode the image information and acquire input secret image file S. IV. RESULT Several experiments are performed to evaluate our proposed methods. Eleven grayscale images with size 512 · 512 are used in the experiments as cover images namely „Lena‟, ‟Baboon‟, ‟Peppers‟, ‟F16‟, ‟Boat‟, ‟Man‟, ‟Tiffany‟, ‟Barbara‟, ‟Elaine‟, ‟Couple‟, ‟Splash‟, and are shown in Fig. 1. The proposed schemes have been implemented using the MATLAB 7.8.0.347 (R2009a) program on Windows XP platform. Fig. 1: Eleven cover images are used for the proposed schemes V. CONCLUSION The cover image is taken as a graysacle image of 256X256 pixels for experiment. The secret message is embedded in the middle frequency part of the DCT coefficients. The PSNR (decibel format) and MSE are used as measurement of the quality of image coding and compression. If PSNR is high then images are best quality. This method provides acceptable image quality and highly robust system. REFERENCES [1] Manveer Kaur1, Gagandeep Kaur2, 2014,” Review of Various Steganalysis Techniques”, International Journal of Computer Science and Information Technologies, Vol.5 (2). [2] Natarajan Meghanathan, Lopamudra Nayak, January 2010, "STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO AND VIDEO COVER MEDIA”, International Journal of Network Security & Its Application (IJNSA). [3] Dr.P.Sujatha, Dr.S.Purushothaman, P.Rajeswari, January 2014, “Computational Complexity Evaluation of ANN Algorithms for Image Steganalysis”, International Journal of Latest Trends in Engineering and Technology (IJLTET), Vol. 3 Issue 3. [4] Manu Devi, Ms. Nidhi Sharma, August, 2013, “Improvements of Steganography Parameter in Binary Images and JPEG Images against Steganalysis”, INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY. [5] Krati vyas1, B.L.Pal, January 2014 , “A PROPOSED METHOD IN IMAGE STEGANOGRAPHY TO IMPROVE IMAGE QUALITY WITH LSB TECHNIQUE”, International Journal of Advanced Research in Computer and Communication Engineering, Vol. 3, Issue 1. [6] Siva Janakiraman, Suriya.N, Nithiya.V, Badrinath Radhakrishnan, Janani Ramanathan and Rengarajan Amirtharajan, " Reflective Code for Gray Block Embedding," Proceedings of the International Conference on Pattern Recognition, Informatics and Medical Engineering,IEEE, pp: 215-220, 2012. [7] Prabakaran G, Dr. Bhavani R and Rajeswari P. S, “Multi Secure and Robustness for Medical Image Based Steganography Scheme”, International Conference on Circuits, Power and Computing Technologies [ICCPCT-], IEEE, and pp: 1188-1193, 2013. [8] Vu Mai, Ibrahim Khalil, Ayman Ibaida, “Steganography-based Access Control to Medical Data Hidden in Electrocardiogram”, 35th Annual International Conference of the IEEE EMBS, pp: 1302-1305, 2013.