SlideShare a Scribd company logo
1 of 4
Download to read offline
A new hybrid steganographic method for histogram
preservation
Umesh Ghanekar
Abstract— This paper presents a histogram preserving data
embedding method for grey-scale images which is based on pixel
value differencing (PVD) and least-significant-bit (LSB)
substitution methods. Various PVD based steganographic
methods achieve high data embedding capacity with minimum
distortions in stego image at the cost of change in histogram
characteristics which is can be detected by histogram based
steganalysers. This persistent problem can been taken care off by
proposed method of data hiding. The improved performance of
the proposed method is verified through extensive simulations.
Keywords—steganography; PVD; embedding capacity;
histogram characteristics;
I. INTRODUCTION
In recent years, steganography has emerged as an
interesting area of research. Steganography is basically used to
enhance the communications security. It hides the very
existence of the secret message into the cover media such as
digital image, audio, video, text etc [1]. In this paper, grey-
scale digital images have been used as the cover media for
hiding the secret message.
Many data hiding methods have been proposed so far and
among them the most simple and well- known steganography
method is least-significant-bit (LSB) replacement. Here, the
secret message is concealed directly into the LSBs of each
pixel of an image. This direct embedding procedure of various
existing spatial domain steganographic methods like LSB
replacement and others is incapable of exploiting the true
embedding capacity of any cover image. An image consists of
two areas i.e. edge area and smooth area. Edge areas can be
embedded with more number of bits than smooth areas, as
edges are less sensitive towards the changes in pixel
intensities. In 2003, Wu and Tsai used this concept and
presented a steganography method using PVD [2]. This
method hides different amount of secret bits in consecutive
non-overlapping pixel pairs by taking the difference value
between the pixels of a pixel pair. Further to increase the
embedding capacity a hybrid method based on PVD and fixed
sized LSB method was proposed by Wu et al. [3]. In 2008,
another hybrid method was presented based on PVD and
modulus function [4]. This method provides higher
imperceptibility of the stego image than the previous methods
while maintaining good data embedding capacity. An adaptive
LSB replacement method was also proposed in 2008 which
utilises the basic concept of data hiding based on human visual
system (HVS) [5]. As a result, pixels are embedded with
different number of secret bits using LSB replacement
method. In the year 2012, a novel adaptive data hiding method
based on LSB substitution and PVD was proposed [6]. This
method is able to conceal large amount of secret data and
provide good stego image quality but is unable to preserve
histogram characteristics.
Here, we have proposed a steganographic method using
LSB substitution and PVD in order to preserve the image
histogram. In this method, we have increased the block size to
3 3 as compared to 1 3 of adaptive LSB and PVD [6]. The
central pixel of each block is termed as base pixel and 3-bits
are embedded in this pixel with the help of LSB replacement
method and optimal pixel adjustment process (OPAP) [7].
Remaining pixels of the block are embedded with secret data
bits using PVD. The performance of the proposed method is
demonstrated through extensive simulations.
The paper is organized as follows. Section II presents the
proposed method. Experimental results are shown in section
III. Finally, conclusions are given in section IV.
II. PROPOSED METHOD
This section deals with the procedure of proposed method
which consists of three phases, namely, the range division
phase, the embedding phase and the extracting phase. These
phases are described as follows.
A. Range division phase
Prior to embedding the secret message, the grey level range
[0,255] is divided into five ranges where
, denotes the lower bound of the range
and denotes the upper bound of the range . These five
ranges can be , , ,
and . Fig. 1 shows the dividing
case i.e. div=31 for the proposed method. It divides the range
[0,255] into „lower level‟ which consist of ranges
, , and „higher level‟ which
include ranges , . Let are the
number of bits to be embedded in the pixels falling under the
range . According to HVS, changes in edge areas are less
visible than smooth areas and hence more data can be
Priya darshni,
Dept. of Electronics and Communication Engineering National Institute of Technology
Kurukshetra, India
priyadarshni.ece@gmail.com, ugnitk@nitkkr.ac.in
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
139 NITTTR, Chandigarh EDIT-2015
embedded in edges. In the proposed method, first three ranges
( fall under the category of smooth regions
whereas last two ranges falls in the edge regions.
Therefore, we propose to embed bits in the lower level and
bits in the higher level.
B. Embedding phase
The cover image is divided into consecutive non-
overlapping blocks of size 3 3 in raster scan manner. Each
block has a centre pixel named as base pixel . Data
embedding in each block is performed by the following steps
as given in [6].
Step 1: Consider 3-rightmost LSBs of and transform these
three LSBs to a decimal value, say . Read 3-bits from
binary secret data in continuation and replace the 3 LSBs of
with these binary secret data bits to obtain . Also,
transform these bits to a decimal value, say .
Step 2: Compute the difference value using .
Step 3: Modify using OPAP as follows
{
(1)
Step 4: Compute the absolute difference values between the
base pixel and other pixels of the block by using
| | (2)
where and denotes the location of the pixel in a block.
Therefore, eight difference values are calculated.
Step 5: Assign the ranges corresponding to the differences
found in Step 4 and obtain the lower bounds too i.e. .
Accordingly, calculate which denotes the number of bits to
be concealed into eight pixels.
Step 6: Read bits in continuation from the binary secret
message and transform these bit-sequences into decimal
values, say . Now, compute the new difference values
using
(3)
Step 7: Calculate the two new values of each pixel of a block
using
(4)
Step 8: Choose the best new value for these pixels from the
values obtained in Step 7 using
{
| | | |
(5)
Repeat the above procedure for every block of the cover
image so as to obtain the final stego image.
C. Extracting phase
At first, the stego image is divided into consecutive non
overlapping blocks of size 3 3 and then for the complete
extraction of the secret message following steps are executed.
Step 1: Select the centre pixel as the base pixel and extract 3-
LSB bits from it. Call this binary sequence as .
Step 2: Calculate the absolute difference values between
the base pixel and the other pixels of a block and then find the
range to which these difference values belong to. Then, obtain
the lower bound of the corresponding range and also
determine the number of bits to be extracted from each
pixel.
Step 3: Obtain the secret data sub-streams as by taking the
difference between above calculated difference values and
respective lower bounds. Transform to binary strings with
length equivalent to .
Finally, concatenate , to obtain the original bit sequence
of the secret message.
Lower-level Higher-level
𝐼𝑅 =[0,7] 𝐼𝑅 =[8,15] 𝐼𝑅 =[16,31] 𝐼𝑅 =[32,63] 𝐼𝑅 =[64,255]
Fig.1 The dividing case (div=31) of the proposed method with „lower level‟ and higher level‟.
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
NITTTR, Chandigarh EDIT -2015 140
III. EXPERIMENTAL RESULTS
The simulation is done using several 8-bit grey-scale
images of size 512 512 taken from SIPI image database [8].
The secret message to be embedded is in the form of text.
The objective criterion used for evaluating the distortions
in the stego image is PSNR and is given by:
1 1
1
( ( , ) ( , ))
M N
i j
MSE C i j S i j
M N  
 


2
1010log
Max
PSNR
MSE
 
  
 
(6)
where and denotes the image size, and
represents the corresponding cover and stego image pixels. A
high PSNR value denotes that there is less dissimilarity
between cover and stego image. It can be seen from Table I
that the proposed method provides improved embedding
capacity and stego image quality within acceptable limits. For
subjective evaluation images are shown in Fig. 2 which shows
that the changes are unobservable even after large amount of
data hiding.
Besides providing large data hiding capacity and good
quality of stego image, a steganographic method needs to be
resistant against steganalytic attacks such as chi-square [9], r-s
steganalysis [10], HCF COM [11] and others. Mainly the
steganalysers are based on image histogram, therefore, if the
histogram characteristics are preserved properly then high
resistance against the well-known detectors can be achieved.
The criteria for evaluating the changes in image histogram is
to compute the number of uncompensated changes after full
data embedding and is given by [12]:
255
0
( ) ( )
2
c s
i
h i h i
uc 



(7)
(a) (b)
Fig. 2 (a) Test cover images and (b) stego images obtained using our proposed
method.
Cover Adaptive LSB–PVD method Proposed method
images
Capacity, bit Bit rate, bpp PSNR, dB Capacity, bit Bit rate, bpp PSNR, dB
Boat 789307 3.01 34.8337 793034 3.02 35.2782
Barbara 806597 3.07 32.9321 809647 3.08 32.9764
Couple 785793 2.99 32.6727 790605 3.01 32.7946
Man 792879 3.02 33.6723 795835 3.03 33.3933
TABLE I. COMPARSIONS OF THE RESULTS BETWEEN ADAPTIVE LSB SUBSTITUTION-PVD METHOD (TYPE 1 DIVISION (K=3)) AND
THE PROPOSED METHOD
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
141 NITTTR, Chandigarh EDIT-2015
where, stands for uncompensated changes while and
represents the histogram of cover and stego images. Fig. 3
shows that the proposed method performs better in
preserving the histogram as the average number of
uncompensated changes of the proposed method are less i.e.
11877 as compared to 15668 of adaptive LSB-PVD method
[6].
Fig. 3 Uncompensated changes in histogram after embedding via our method
and adaptive LSB subs.-PVD method.
IV. CONCLUSIONS
In this paper, we have presented a histogram preserving
data hiding method which is based on LSB substitution and
PVD. This method can hide large amount of secret data as
well as provide an imperceptible stego image quality while
compensating for the dissimilarity between the histograms of
the cover and stego images. This advantage of keeping the
change in image histogram within permissible limit helps the
proposed method to show better resistance against histogram
based steganalysers. The efficacy of the proposed method is
verified via several experimental results which yielded better
performance in comparison with adaptive LSB -PVD method.
REFERENCES
[1] F. Petitcolas, R. Anderson, and M. Kuhn, “Information hiding- a
survey,” Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078, 1999.
[2] D. C. Wu and W. H. Tsai, “A steganographic method for images by
pixel-value-differencing,” Pattern Recognit. Lett., vol. 24, no. 9-10, pp.
1613-1626, 2003.
[3] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image
steganographic scheme based on pixel-value-differencing and LSB
replacement methods,” Proc. Inst. Elect. Eng.,Vis. Images Signal
Process., vol. 152, no. 5, pp. 611-615, 2005.
[4] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “ A high quality
steganographic method with pixel value differencing and modulus
function,” The Journal of Sys.and Soft., vol.81, pp. 150-158, 2008.
[5] C.-H. Yang, C.-Y. Weng, S.-J. Wang and H.-M. Sun, “Adaptive data
hiding in edge areas of images with spatial LSB domain systems,” IEEE
Trans. Inf. Forensics Sec., vol. 3, no. 3, pp. 488-497, 2008.
[6] M. Khodaei and K. Faez, “New adaptive steganographic method using
least-significant-bit substitution and pixel-value differencing,” IET
Image Processing, vol. 6, iss. 6, pp. 677-686, 2012.
[7] C. K. Chan and L. M. Cheng, “Hiding data in image by simple LSB
substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004.
[8] The USC-SIPI Image Database, http://sipi.usc.edu/database.
[9] A. D. Kher, “Improved detection of LSB steganography in grayscale
images,” Lecture Notes in Computer Science, vol. 3200, pp. 583-592,
2005.
[10] J. Fridrich, M. Goljan, and R. Du, “Relaiable detection of LSB
steganography in color and grayscale images,” Proc. ACM Workshop on
Multi. And Sec., pp. 61-75, 2000.
[11] A. D. Kher, “Steganalysis of LSB matching in grayscale images,” IEEE
Signal Process. Lett., vol. 12, no. 6, pp. 441-444, 2005.
[12] S. Sarreshtedari and M. A. Akhaee, “one-third probability embedding: a
new histogram compensating image LSB steganography scheme,”
IET Image Process., vol. 8, iss. 2, pp. 78-89, 2014.
1 2 3 4 5 6 7 8 9 10
0
0.5
1
1.5
2
2.5
3
3.5
4
x 10
4
image number
numberofuncompensatedchanges
proposed method
adaptive LSB-PVD
Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426
NITTTR, Chandigarh EDIT -2015 142

More Related Content

What's hot

PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMijcsit
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Super Resolution with OCR Optimization
Super Resolution with OCR OptimizationSuper Resolution with OCR Optimization
Super Resolution with OCR OptimizationniveditJain
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...IJMER
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...IJERA Editor
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...IJCSIS Research Publications
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
 
Block coordinate descent__in_computer_vision
Block coordinate descent__in_computer_visionBlock coordinate descent__in_computer_vision
Block coordinate descent__in_computer_visionYoussefKitane
 

What's hot (13)

PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHMPIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
PIXEL SIZE REDUCTION LOSS-LESS IMAGE COMPRESSION ALGORITHM
 
H017416670
H017416670H017416670
H017416670
 
I07015261
I07015261I07015261
I07015261
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
A1804010105
A1804010105A1804010105
A1804010105
 
Super Resolution with OCR Optimization
Super Resolution with OCR OptimizationSuper Resolution with OCR Optimization
Super Resolution with OCR Optimization
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
 
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
Non-Separable Histogram Based Reversible Data Hiding Approach Using Inverse S...
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency Domains
 
Block coordinate descent__in_computer_vision
Block coordinate descent__in_computer_visionBlock coordinate descent__in_computer_vision
Block coordinate descent__in_computer_vision
 

Viewers also liked

Viewers also liked (16)

Tugas3
Tugas3Tugas3
Tugas3
 
MyCV
MyCVMyCV
MyCV
 
Brandy Horton Resume 2016-R
Brandy Horton Resume 2016-RBrandy Horton Resume 2016-R
Brandy Horton Resume 2016-R
 
Rwarinda U Angelo
Rwarinda U AngeloRwarinda U Angelo
Rwarinda U Angelo
 
7-WISE Course 2010
7-WISE Course 20107-WISE Course 2010
7-WISE Course 2010
 
L3V3L UP
L3V3L UPL3V3L UP
L3V3L UP
 
Aerie Pharmaceuticals
Aerie PharmaceuticalsAerie Pharmaceuticals
Aerie Pharmaceuticals
 
Redes
RedesRedes
Redes
 
AHM July CP10
AHM July CP10AHM July CP10
AHM July CP10
 
AHM AUG FS10
AHM AUG FS10AHM AUG FS10
AHM AUG FS10
 
Project plan
Project planProject plan
Project plan
 
تقدیرنامه بانک جهانی
تقدیرنامه بانک جهانیتقدیرنامه بانک جهانی
تقدیرنامه بانک جهانی
 
Lead score like a rockstar
Lead score like a rockstarLead score like a rockstar
Lead score like a rockstar
 
Centro misionero cristiano internacional
Centro misionero cristiano internacionalCentro misionero cristiano internacional
Centro misionero cristiano internacional
 
MCM Final Presentation
MCM Final PresentationMCM Final Presentation
MCM Final Presentation
 
Clearsight
ClearsightClearsight
Clearsight
 

Similar to A new hybrid steganographic method for histogram preservation

An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Budi Santo
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
An Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image SteganalysisAn Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image SteganalysisIRJET Journal
 

Similar to A new hybrid steganographic method for histogram preservation (20)

An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAP
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
C010231217
C010231217C010231217
C010231217
 
An Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image SteganalysisAn Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image Steganalysis
 

More from IJEEE

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...IJEEE
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...IJEEE
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoIJEEE
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemIJEEE
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierIJEEE
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...IJEEE
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...IJEEE
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas IJEEE
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...IJEEE
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyIJEEE
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewIJEEE
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyIJEEE
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringIJEEE
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyIJEEE
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsIJEEE
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications IJEEE
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsIJEEE
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyIJEEE
 

More from IJEEE (20)

A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
A survey on Energy Efficient ProtocolsLEACH, Fuzzy-based approach and Neural ...
 
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...Implementation of Back-Propagation Neural Network using Scilab and its Conver...
Implementation of Back-Propagation Neural Network using Scilab and its Conver...
 
Automated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using ArduinoAutomated Air Cooled Three Level Inverter system using Arduino
Automated Air Cooled Three Level Inverter system using Arduino
 
Id136
Id136Id136
Id136
 
Id135
Id135Id135
Id135
 
An Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric SystemAn Approach to Speech and Iris based Multimodal Biometric System
An Approach to Speech and Iris based Multimodal Biometric System
 
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid AmplifierAn Overview of EDFA Gain Flattening by Using Hybrid Amplifier
An Overview of EDFA Gain Flattening by Using Hybrid Amplifier
 
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
Design and Implementation of FPGA Based Low Power Pipelined 64 Bit Risc Proce...
 
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
Design of Image Segmentation Algorithm for Autonomous Vehicle Navigationusing...
 
Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas Performance Analysis of GSM Network for Different Types of Antennas
Performance Analysis of GSM Network for Different Types of Antennas
 
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
On the Performance Analysis of Composite Multipath/Shadowing (Weibull-Log Nor...
 
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm TechnologyDesign Analysis of Delay Register with PTL Logic using 90 nm Technology
Design Analysis of Delay Register with PTL Logic using 90 nm Technology
 
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A ReviewCarbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
Carbon Nanotubes Based Sensor for Detection of Traces of Gas Molecules- A Review
 
Routing Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A SurveyRouting Protocols in Zigbee Based networks: A Survey
Routing Protocols in Zigbee Based networks: A Survey
 
A Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health MonitoringA Survey of Routing Protocols for Structural Health Monitoring
A Survey of Routing Protocols for Structural Health Monitoring
 
Layout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS TechnologyLayout Design Analysis of SR Flip Flop using CMOS Technology
Layout Design Analysis of SR Flip Flop using CMOS Technology
 
Codec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI InterconnectsCodec Scheme for Power Optimization in VLSI Interconnects
Codec Scheme for Power Optimization in VLSI Interconnects
 
Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications Design of Planar Inverted F-Antenna for Multiband Applications
Design of Planar Inverted F-Antenna for Multiband Applications
 
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor GraphicsDesign of CMOS Inverter for Low Power and High Speed using Mentor Graphics
Design of CMOS Inverter for Low Power and High Speed using Mentor Graphics
 
Layout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm TechnologyLayout Design Analysis of CMOS Comparator using 180nm Technology
Layout Design Analysis of CMOS Comparator using 180nm Technology
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

A new hybrid steganographic method for histogram preservation

  • 1. A new hybrid steganographic method for histogram preservation Umesh Ghanekar Abstract— This paper presents a histogram preserving data embedding method for grey-scale images which is based on pixel value differencing (PVD) and least-significant-bit (LSB) substitution methods. Various PVD based steganographic methods achieve high data embedding capacity with minimum distortions in stego image at the cost of change in histogram characteristics which is can be detected by histogram based steganalysers. This persistent problem can been taken care off by proposed method of data hiding. The improved performance of the proposed method is verified through extensive simulations. Keywords—steganography; PVD; embedding capacity; histogram characteristics; I. INTRODUCTION In recent years, steganography has emerged as an interesting area of research. Steganography is basically used to enhance the communications security. It hides the very existence of the secret message into the cover media such as digital image, audio, video, text etc [1]. In this paper, grey- scale digital images have been used as the cover media for hiding the secret message. Many data hiding methods have been proposed so far and among them the most simple and well- known steganography method is least-significant-bit (LSB) replacement. Here, the secret message is concealed directly into the LSBs of each pixel of an image. This direct embedding procedure of various existing spatial domain steganographic methods like LSB replacement and others is incapable of exploiting the true embedding capacity of any cover image. An image consists of two areas i.e. edge area and smooth area. Edge areas can be embedded with more number of bits than smooth areas, as edges are less sensitive towards the changes in pixel intensities. In 2003, Wu and Tsai used this concept and presented a steganography method using PVD [2]. This method hides different amount of secret bits in consecutive non-overlapping pixel pairs by taking the difference value between the pixels of a pixel pair. Further to increase the embedding capacity a hybrid method based on PVD and fixed sized LSB method was proposed by Wu et al. [3]. In 2008, another hybrid method was presented based on PVD and modulus function [4]. This method provides higher imperceptibility of the stego image than the previous methods while maintaining good data embedding capacity. An adaptive LSB replacement method was also proposed in 2008 which utilises the basic concept of data hiding based on human visual system (HVS) [5]. As a result, pixels are embedded with different number of secret bits using LSB replacement method. In the year 2012, a novel adaptive data hiding method based on LSB substitution and PVD was proposed [6]. This method is able to conceal large amount of secret data and provide good stego image quality but is unable to preserve histogram characteristics. Here, we have proposed a steganographic method using LSB substitution and PVD in order to preserve the image histogram. In this method, we have increased the block size to 3 3 as compared to 1 3 of adaptive LSB and PVD [6]. The central pixel of each block is termed as base pixel and 3-bits are embedded in this pixel with the help of LSB replacement method and optimal pixel adjustment process (OPAP) [7]. Remaining pixels of the block are embedded with secret data bits using PVD. The performance of the proposed method is demonstrated through extensive simulations. The paper is organized as follows. Section II presents the proposed method. Experimental results are shown in section III. Finally, conclusions are given in section IV. II. PROPOSED METHOD This section deals with the procedure of proposed method which consists of three phases, namely, the range division phase, the embedding phase and the extracting phase. These phases are described as follows. A. Range division phase Prior to embedding the secret message, the grey level range [0,255] is divided into five ranges where , denotes the lower bound of the range and denotes the upper bound of the range . These five ranges can be , , , and . Fig. 1 shows the dividing case i.e. div=31 for the proposed method. It divides the range [0,255] into „lower level‟ which consist of ranges , , and „higher level‟ which include ranges , . Let are the number of bits to be embedded in the pixels falling under the range . According to HVS, changes in edge areas are less visible than smooth areas and hence more data can be Priya darshni, Dept. of Electronics and Communication Engineering National Institute of Technology Kurukshetra, India priyadarshni.ece@gmail.com, ugnitk@nitkkr.ac.in Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 139 NITTTR, Chandigarh EDIT-2015
  • 2. embedded in edges. In the proposed method, first three ranges ( fall under the category of smooth regions whereas last two ranges falls in the edge regions. Therefore, we propose to embed bits in the lower level and bits in the higher level. B. Embedding phase The cover image is divided into consecutive non- overlapping blocks of size 3 3 in raster scan manner. Each block has a centre pixel named as base pixel . Data embedding in each block is performed by the following steps as given in [6]. Step 1: Consider 3-rightmost LSBs of and transform these three LSBs to a decimal value, say . Read 3-bits from binary secret data in continuation and replace the 3 LSBs of with these binary secret data bits to obtain . Also, transform these bits to a decimal value, say . Step 2: Compute the difference value using . Step 3: Modify using OPAP as follows { (1) Step 4: Compute the absolute difference values between the base pixel and other pixels of the block by using | | (2) where and denotes the location of the pixel in a block. Therefore, eight difference values are calculated. Step 5: Assign the ranges corresponding to the differences found in Step 4 and obtain the lower bounds too i.e. . Accordingly, calculate which denotes the number of bits to be concealed into eight pixels. Step 6: Read bits in continuation from the binary secret message and transform these bit-sequences into decimal values, say . Now, compute the new difference values using (3) Step 7: Calculate the two new values of each pixel of a block using (4) Step 8: Choose the best new value for these pixels from the values obtained in Step 7 using { | | | | (5) Repeat the above procedure for every block of the cover image so as to obtain the final stego image. C. Extracting phase At first, the stego image is divided into consecutive non overlapping blocks of size 3 3 and then for the complete extraction of the secret message following steps are executed. Step 1: Select the centre pixel as the base pixel and extract 3- LSB bits from it. Call this binary sequence as . Step 2: Calculate the absolute difference values between the base pixel and the other pixels of a block and then find the range to which these difference values belong to. Then, obtain the lower bound of the corresponding range and also determine the number of bits to be extracted from each pixel. Step 3: Obtain the secret data sub-streams as by taking the difference between above calculated difference values and respective lower bounds. Transform to binary strings with length equivalent to . Finally, concatenate , to obtain the original bit sequence of the secret message. Lower-level Higher-level 𝐼𝑅 =[0,7] 𝐼𝑅 =[8,15] 𝐼𝑅 =[16,31] 𝐼𝑅 =[32,63] 𝐼𝑅 =[64,255] Fig.1 The dividing case (div=31) of the proposed method with „lower level‟ and higher level‟. Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 NITTTR, Chandigarh EDIT -2015 140
  • 3. III. EXPERIMENTAL RESULTS The simulation is done using several 8-bit grey-scale images of size 512 512 taken from SIPI image database [8]. The secret message to be embedded is in the form of text. The objective criterion used for evaluating the distortions in the stego image is PSNR and is given by: 1 1 1 ( ( , ) ( , )) M N i j MSE C i j S i j M N       2 1010log Max PSNR MSE        (6) where and denotes the image size, and represents the corresponding cover and stego image pixels. A high PSNR value denotes that there is less dissimilarity between cover and stego image. It can be seen from Table I that the proposed method provides improved embedding capacity and stego image quality within acceptable limits. For subjective evaluation images are shown in Fig. 2 which shows that the changes are unobservable even after large amount of data hiding. Besides providing large data hiding capacity and good quality of stego image, a steganographic method needs to be resistant against steganalytic attacks such as chi-square [9], r-s steganalysis [10], HCF COM [11] and others. Mainly the steganalysers are based on image histogram, therefore, if the histogram characteristics are preserved properly then high resistance against the well-known detectors can be achieved. The criteria for evaluating the changes in image histogram is to compute the number of uncompensated changes after full data embedding and is given by [12]: 255 0 ( ) ( ) 2 c s i h i h i uc     (7) (a) (b) Fig. 2 (a) Test cover images and (b) stego images obtained using our proposed method. Cover Adaptive LSB–PVD method Proposed method images Capacity, bit Bit rate, bpp PSNR, dB Capacity, bit Bit rate, bpp PSNR, dB Boat 789307 3.01 34.8337 793034 3.02 35.2782 Barbara 806597 3.07 32.9321 809647 3.08 32.9764 Couple 785793 2.99 32.6727 790605 3.01 32.7946 Man 792879 3.02 33.6723 795835 3.03 33.3933 TABLE I. COMPARSIONS OF THE RESULTS BETWEEN ADAPTIVE LSB SUBSTITUTION-PVD METHOD (TYPE 1 DIVISION (K=3)) AND THE PROPOSED METHOD Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 141 NITTTR, Chandigarh EDIT-2015
  • 4. where, stands for uncompensated changes while and represents the histogram of cover and stego images. Fig. 3 shows that the proposed method performs better in preserving the histogram as the average number of uncompensated changes of the proposed method are less i.e. 11877 as compared to 15668 of adaptive LSB-PVD method [6]. Fig. 3 Uncompensated changes in histogram after embedding via our method and adaptive LSB subs.-PVD method. IV. CONCLUSIONS In this paper, we have presented a histogram preserving data hiding method which is based on LSB substitution and PVD. This method can hide large amount of secret data as well as provide an imperceptible stego image quality while compensating for the dissimilarity between the histograms of the cover and stego images. This advantage of keeping the change in image histogram within permissible limit helps the proposed method to show better resistance against histogram based steganalysers. The efficacy of the proposed method is verified via several experimental results which yielded better performance in comparison with adaptive LSB -PVD method. REFERENCES [1] F. Petitcolas, R. Anderson, and M. Kuhn, “Information hiding- a survey,” Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078, 1999. [2] D. C. Wu and W. H. Tsai, “A steganographic method for images by pixel-value-differencing,” Pattern Recognit. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003. [3] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image steganographic scheme based on pixel-value-differencing and LSB replacement methods,” Proc. Inst. Elect. Eng.,Vis. Images Signal Process., vol. 152, no. 5, pp. 611-615, 2005. [4] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, “ A high quality steganographic method with pixel value differencing and modulus function,” The Journal of Sys.and Soft., vol.81, pp. 150-158, 2008. [5] C.-H. Yang, C.-Y. Weng, S.-J. Wang and H.-M. Sun, “Adaptive data hiding in edge areas of images with spatial LSB domain systems,” IEEE Trans. Inf. Forensics Sec., vol. 3, no. 3, pp. 488-497, 2008. [6] M. Khodaei and K. Faez, “New adaptive steganographic method using least-significant-bit substitution and pixel-value differencing,” IET Image Processing, vol. 6, iss. 6, pp. 677-686, 2012. [7] C. K. Chan and L. M. Cheng, “Hiding data in image by simple LSB substitution,” Pattern Recognition, vol. 37, no. 3, pp. 469-474, 2004. [8] The USC-SIPI Image Database, http://sipi.usc.edu/database. [9] A. D. Kher, “Improved detection of LSB steganography in grayscale images,” Lecture Notes in Computer Science, vol. 3200, pp. 583-592, 2005. [10] J. Fridrich, M. Goljan, and R. Du, “Relaiable detection of LSB steganography in color and grayscale images,” Proc. ACM Workshop on Multi. And Sec., pp. 61-75, 2000. [11] A. D. Kher, “Steganalysis of LSB matching in grayscale images,” IEEE Signal Process. Lett., vol. 12, no. 6, pp. 441-444, 2005. [12] S. Sarreshtedari and M. A. Akhaee, “one-third probability embedding: a new histogram compensating image LSB steganography scheme,” IET Image Process., vol. 8, iss. 2, pp. 78-89, 2014. 1 2 3 4 5 6 7 8 9 10 0 0.5 1 1.5 2 2.5 3 3.5 4 x 10 4 image number numberofuncompensatedchanges proposed method adaptive LSB-PVD Int. Journal of Electrical & Electronics Engg. Vol. 2, Spl. Issue 1 (2015) e-ISSN: 1694-2310 | p-ISSN: 1694-2426 NITTTR, Chandigarh EDIT -2015 142