SlideShare a Scribd company logo
1 of 4
Rahul Joshi, Lokesh Gagnani / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.1291-1294
1291 | P a g e
Improve Security & Quality of Stego Image Using Proposed LSB
Method
Rahul Joshi1
, Lokesh Gagnani2
1
PG Student,KIRC,Kalol
2
Asst Prof,KIRC (I.T Department),Kalol
Abstract
Steganography is the art of hiding the
fact that communication is taking place, by
hiding information in other information.In this
paper proposed method focus on improving
quality of stego image by increasing value of
PSNR and SNR with less number of LSB
changed compare to simple LSB method result
in better security. This paper also compares
results of proposed method with simple LSB.
I. INTRODUCTION
Steganography is the art and science of
invisible communication. This is accomplished
through hiding information in other information,
thus hiding the existence of the communicated
information. The word steganography is derived
from the Greek words “stegos” meaning “cover”
and “grafia” meaning “writing” [1] defining it as
“covered writing”. In image steganography the
information is hidden exclusively in images. Today
steganography is mostly used on computers with
digital data being the carriers and networks being
the high speed delivery channels. Steganography
differs from cryptography in the sense that where
cryptography focuses on keeping the contents of a
message secret, steganography focuses on keeping
the existence of a message secret [2].
Steganography and cryptography are both ways to
protect information from unwanted parties but
neither technology alone is perfect and can be
compromised. Once the presence of hidden
information is revealed or even suspected, the
purpose of steganography is partly defeated [2].
The strength of steganography can thus be
amplified by combining it with cryptography.
Research in steganography has mainly been driven
by a lack of strength in cryptographic systems.
Many governments have created laws to either
limit the strength of a cryptographic system or to
prohibit it altogether [3], forcing people to study
other methods of secure information transfer.
Businesses have also started to realize the potential
of steganography in communicating trade secrets or
new product information. Avoiding communication
through well-known channels greatly reduces the
risk of information being leaked in transit [4].
Hiding information in a photograph of the
company picnic is less suspicious than
communicating an encrypted file.
II. SIMPLE LSB METHOD
Algorithm
The popular and oldest method for hiding the
message in a digital image is the LSB method. In
LSB method we hide the message in the least
significant bits (LSB’s) of pixel values of an image.
In this method binary equivalent of the secret
message is distributed among the LSBs of each
pixel.
For example data bits 01100101 are tried to hide
into an 8 bit image. According to this technique 8
consecutive pixels from top left corner of the image
are selected. The binary equivalent of those pixels
may be like this:
00100101 11101011 11001010 00100011
11111000 11101111 11001110 11100111
Now each bit of data 01100101 are copied serially
(from left hand side) to the LSB’s of equivalent
binary pattern of pixels, resulting the bit pattern
would become:
00100100 11101011 11001011 00100010
11111000 11101111 11001110 11100111
The problem with this technique is that it is very
vulnerable to attacks such as image compression
and quantization of noise.
III PROPOSED LSB METHOD
Algorithm-Hiding Operation
Rahul Joshi, Lokesh Gagnani / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.1291-1294
1292 | P a g e
.
Algorithm-Extracting Operation
In this method message bits divide into
segment using proper segment length ( like 2,4,8
etc). Create the segments in such a way that consist
equal number of bits in each segment. Select
suitable cover image enough to embed entire
message. For testing purpose I use bmp type image
of 8 bit depth. Store segments into one list called
segment list. Find all lsb of cover image and store
into one dimensional array called imagebits. Now
find the best match sequence of lsb in one segment
with sequence of imagebits. If match is found then
replace that sequence of lsb with message bits of
segment. If match is not found then insert message
bits into lsbs without overlapping the sequence of
lsb .Repeat this process for all segments.
Resultant image is called stego image. To extract
message follow algorithm for extracting operation.
IV.EXPERIMENTAL PARAMETER
a) .Number of LSB changed
This parameter count the number of lsb changed.
For better result value of this parameter keep as
minimum as possible
b). Time
This parameter use to measure time required to
hide message in image and also time required to
retrieve message from image.
c). Signal to Noise Ratio
SNR is calculate using following equation
Signal-to-noise ratio expressed in dB
d).Peak Signal to Noise Ratio
Peak signal-to-noise ratio expressed in dB
PSNR is the standard measurement used in
steganography technique in order to test the quality
of the stego images. Higher the value of PSNR
more the quality of the stego image.
V. EXPERIMENTAL RESULT
After implementation of Simple and
Proposed LSB method for lena.bmp and
rocket.bmp in Matlab (R2009a) following results
are obtained. Here both images have 8 bit depth.
Following Table shows the result of both methods
for lena.bmp
Rahul Joshi, Lokesh Gagnani / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.1291-1294
1293 | P a g e
Following Table shows the result of both methods
for rocket.bmp
Following Figures ( a to d) Shows the effect of
segment length on various parameters for
lena.bmp
(a)
(b)
(c)
(d)
Following Figures (e to h) shows the effect of
segment length on various parameters for
rocket.bmp
(e)
Rahul Joshi, Lokesh Gagnani / International Journal of Engineering Research and Applications
(IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.1291-1294
1294 | P a g e
(f)
( g)
(h)
Figure (a,e) shows the effect of segment length (for
2,4,5) on number of LSB changed. As length of
segment is increase number of LSB changed also
increase because probability of finding match
sequence is decrease as length of segment is
increase.
Figure (b,f) shows the effect of segment length (for
2,4,5) on SNR. As length of segment is increase
value of SNR is decrease due to number of LSB
changed increase. This is also true for rocket.bmp
Figure (c,g) shows the effect of segment length (for
2,4,5) on PSNR. As length of segment is increase
value of PSNR is decrease due to number of LSB
changed increase.
Figure (d,h) shows the effect of segment length (for
2,4,5) on Time required to hide message in image.
As length of segment is increase time required to
hide message is decrease because number of
segments is decrease .so time spend to search
match sequence is also reduced.
VI CONCLUTION
The main purpose of this method is to
decrease the number of LSB that are changed and
as a result increase the immunity of the stego-
image against the attack by human visual system
(HVS). The problem of the proposed LSB Method
is time required to hiding message that is spend
during the search to find the best matching when
using a large size stego-image. Implementation of
this method for Audio and Video Steganography
will considered as a future work.
REFERENCES
[1] Moerland, T., “Steganography and
Steganalysis”, Leiden Institute of
Advanced Computing Science,
www.liacs.nl/home/ tmoerl/privtech.pdf
[2] Wang, H & Wang, S, “Cyber warfare:
Steganography vs. Steganalysis”,
Communications of the ACM, 47:10,
October 2004
[3] Dunbar, B., “Steganographic techniques
and their use in an Open-Systems
environment”, SANS Institute, January
2002
[4] Artz, D., “Digital Steganography: Hiding
Data within Data”, IEEE Internet
Computing Journal, June 2001

More Related Content

What's hot

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithmMohammed Kharma
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 MethodKaushik Chakraborty
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
Adaptive block-based pixel value differencing steganography
Adaptive block-based pixel value  differencing steganographyAdaptive block-based pixel value  differencing steganography
Adaptive block-based pixel value differencing steganographyOsama Hosam
 
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...CSCJournals
 

What's hot (20)

A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
 
G0210032039
G0210032039G0210032039
G0210032039
 
E017443136
E017443136E017443136
E017443136
 
Steganography
SteganographySteganography
Steganography
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm37 c 551 - reduced changes in the carrier of steganography algorithm
37 c 551 - reduced changes in the carrier of steganography algorithm
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
C010231217
C010231217C010231217
C010231217
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Ijariie1132
Ijariie1132Ijariie1132
Ijariie1132
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Adaptive block-based pixel value differencing steganography
Adaptive block-based pixel value  differencing steganographyAdaptive block-based pixel value  differencing steganography
Adaptive block-based pixel value differencing steganography
 
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
A Spatial Domain Image Steganography Technique Based on Matrix Embedding and ...
 

Viewers also liked

Salvación gratuíta
Salvación gratuítaSalvación gratuíta
Salvación gratuítadiruab
 
C:\Fakepath\Les Estrelles
C:\Fakepath\Les EstrellesC:\Fakepath\Les Estrelles
C:\Fakepath\Les Estrellescaroool28
 
Momentodeverdad Cirqu Eeee[1]
Momentodeverdad Cirqu Eeee[1]Momentodeverdad Cirqu Eeee[1]
Momentodeverdad Cirqu Eeee[1]marisol hdz
 
El Mejor Amigo Del Hombre
El Mejor Amigo Del HombreEl Mejor Amigo Del Hombre
El Mejor Amigo Del HombreSan Juan Bosco
 
Presentación de los 4 pilares
Presentación de los 4 pilaresPresentación de los 4 pilares
Presentación de los 4 pilaresingridbr410
 
Case workshop sep06_lyd2
Case workshop sep06_lyd2Case workshop sep06_lyd2
Case workshop sep06_lyd2hjemstavn
 
RIO STAY RESIDENCE – Ligue (21) 3091-0191
RIO STAY RESIDENCE – Ligue (21) 3091-0191RIO STAY RESIDENCE – Ligue (21) 3091-0191
RIO STAY RESIDENCE – Ligue (21) 3091-0191lucianobatista
 
BELA VISTA - APARTAMENTOS NA TAQUARA - Ligue (21) 3091-0191
BELA VISTA - APARTAMENTOS NA TAQUARA - Ligue (21) 3091-0191BELA VISTA - APARTAMENTOS NA TAQUARA - Ligue (21) 3091-0191
BELA VISTA - APARTAMENTOS NA TAQUARA - Ligue (21) 3091-0191lucianobatista
 
Manuale Monster Truck SSK V2
Manuale Monster Truck SSK V2Manuale Monster Truck SSK V2
Manuale Monster Truck SSK V2Sabattinicars
 
6A - Amanda e emilly
6A - Amanda e emilly6A - Amanda e emilly
6A - Amanda e emillyviannota
 

Viewers also liked (20)

He3312571263
He3312571263He3312571263
He3312571263
 
F33022028
F33022028F33022028
F33022028
 
Gc3111781183
Gc3111781183Gc3111781183
Gc3111781183
 
Custom Homes
Custom HomesCustom Homes
Custom Homes
 
Salvación gratuíta
Salvación gratuítaSalvación gratuíta
Salvación gratuíta
 
C:\Fakepath\Les Estrelles
C:\Fakepath\Les EstrellesC:\Fakepath\Les Estrelles
C:\Fakepath\Les Estrelles
 
Momentodeverdad Cirqu Eeee[1]
Momentodeverdad Cirqu Eeee[1]Momentodeverdad Cirqu Eeee[1]
Momentodeverdad Cirqu Eeee[1]
 
Jaime Camil[1]
Jaime Camil[1]Jaime Camil[1]
Jaime Camil[1]
 
Aurkezpena
AurkezpenaAurkezpena
Aurkezpena
 
Axarquia
AxarquiaAxarquia
Axarquia
 
e-commerce
e-commercee-commerce
e-commerce
 
El Mejor Amigo Del Hombre
El Mejor Amigo Del HombreEl Mejor Amigo Del Hombre
El Mejor Amigo Del Hombre
 
Presentación de los 4 pilares
Presentación de los 4 pilaresPresentación de los 4 pilares
Presentación de los 4 pilares
 
Case workshop sep06_lyd2
Case workshop sep06_lyd2Case workshop sep06_lyd2
Case workshop sep06_lyd2
 
RIO STAY RESIDENCE – Ligue (21) 3091-0191
RIO STAY RESIDENCE – Ligue (21) 3091-0191RIO STAY RESIDENCE – Ligue (21) 3091-0191
RIO STAY RESIDENCE – Ligue (21) 3091-0191
 
BELA VISTA - APARTAMENTOS NA TAQUARA - Ligue (21) 3091-0191
BELA VISTA - APARTAMENTOS NA TAQUARA - Ligue (21) 3091-0191BELA VISTA - APARTAMENTOS NA TAQUARA - Ligue (21) 3091-0191
BELA VISTA - APARTAMENTOS NA TAQUARA - Ligue (21) 3091-0191
 
A Mi Madrid
A Mi MadridA Mi Madrid
A Mi Madrid
 
Manuale Monster Truck SSK V2
Manuale Monster Truck SSK V2Manuale Monster Truck SSK V2
Manuale Monster Truck SSK V2
 
6A - Amanda e emilly
6A - Amanda e emilly6A - Amanda e emilly
6A - Amanda e emilly
 
solucion ejercicio
solucion ejerciciosolucion ejercicio
solucion ejercicio
 

Similar to Hk3312911294

A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...ijcisjournal
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
Data Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value IndicatorData Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value IndicatorCSCJournals
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 

Similar to Hk3312911294 (20)

A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 
L045056469
L045056469L045056469
L045056469
 
O017429398
O017429398O017429398
O017429398
 
G017444651
G017444651G017444651
G017444651
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...High Capacity Image Steganography Using Adjunctive Numerical Representations ...
High Capacity Image Steganography Using Adjunctive Numerical Representations ...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Data Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value IndicatorData Hiding Using Green Channel as Pixel Value Indicator
Data Hiding Using Green Channel as Pixel Value Indicator
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 

Recently uploaded

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

Hk3312911294

  • 1. Rahul Joshi, Lokesh Gagnani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.1291-1294 1291 | P a g e Improve Security & Quality of Stego Image Using Proposed LSB Method Rahul Joshi1 , Lokesh Gagnani2 1 PG Student,KIRC,Kalol 2 Asst Prof,KIRC (I.T Department),Kalol Abstract Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information.In this paper proposed method focus on improving quality of stego image by increasing value of PSNR and SNR with less number of LSB changed compare to simple LSB method result in better security. This paper also compares results of proposed method with simple LSB. I. INTRODUCTION Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is derived from the Greek words “stegos” meaning “cover” and “grafia” meaning “writing” [1] defining it as “covered writing”. In image steganography the information is hidden exclusively in images. Today steganography is mostly used on computers with digital data being the carriers and networks being the high speed delivery channels. Steganography differs from cryptography in the sense that where cryptography focuses on keeping the contents of a message secret, steganography focuses on keeping the existence of a message secret [2]. Steganography and cryptography are both ways to protect information from unwanted parties but neither technology alone is perfect and can be compromised. Once the presence of hidden information is revealed or even suspected, the purpose of steganography is partly defeated [2]. The strength of steganography can thus be amplified by combining it with cryptography. Research in steganography has mainly been driven by a lack of strength in cryptographic systems. Many governments have created laws to either limit the strength of a cryptographic system or to prohibit it altogether [3], forcing people to study other methods of secure information transfer. Businesses have also started to realize the potential of steganography in communicating trade secrets or new product information. Avoiding communication through well-known channels greatly reduces the risk of information being leaked in transit [4]. Hiding information in a photograph of the company picnic is less suspicious than communicating an encrypted file. II. SIMPLE LSB METHOD Algorithm The popular and oldest method for hiding the message in a digital image is the LSB method. In LSB method we hide the message in the least significant bits (LSB’s) of pixel values of an image. In this method binary equivalent of the secret message is distributed among the LSBs of each pixel. For example data bits 01100101 are tried to hide into an 8 bit image. According to this technique 8 consecutive pixels from top left corner of the image are selected. The binary equivalent of those pixels may be like this: 00100101 11101011 11001010 00100011 11111000 11101111 11001110 11100111 Now each bit of data 01100101 are copied serially (from left hand side) to the LSB’s of equivalent binary pattern of pixels, resulting the bit pattern would become: 00100100 11101011 11001011 00100010 11111000 11101111 11001110 11100111 The problem with this technique is that it is very vulnerable to attacks such as image compression and quantization of noise. III PROPOSED LSB METHOD Algorithm-Hiding Operation
  • 2. Rahul Joshi, Lokesh Gagnani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.1291-1294 1292 | P a g e . Algorithm-Extracting Operation In this method message bits divide into segment using proper segment length ( like 2,4,8 etc). Create the segments in such a way that consist equal number of bits in each segment. Select suitable cover image enough to embed entire message. For testing purpose I use bmp type image of 8 bit depth. Store segments into one list called segment list. Find all lsb of cover image and store into one dimensional array called imagebits. Now find the best match sequence of lsb in one segment with sequence of imagebits. If match is found then replace that sequence of lsb with message bits of segment. If match is not found then insert message bits into lsbs without overlapping the sequence of lsb .Repeat this process for all segments. Resultant image is called stego image. To extract message follow algorithm for extracting operation. IV.EXPERIMENTAL PARAMETER a) .Number of LSB changed This parameter count the number of lsb changed. For better result value of this parameter keep as minimum as possible b). Time This parameter use to measure time required to hide message in image and also time required to retrieve message from image. c). Signal to Noise Ratio SNR is calculate using following equation Signal-to-noise ratio expressed in dB d).Peak Signal to Noise Ratio Peak signal-to-noise ratio expressed in dB PSNR is the standard measurement used in steganography technique in order to test the quality of the stego images. Higher the value of PSNR more the quality of the stego image. V. EXPERIMENTAL RESULT After implementation of Simple and Proposed LSB method for lena.bmp and rocket.bmp in Matlab (R2009a) following results are obtained. Here both images have 8 bit depth. Following Table shows the result of both methods for lena.bmp
  • 3. Rahul Joshi, Lokesh Gagnani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.1291-1294 1293 | P a g e Following Table shows the result of both methods for rocket.bmp Following Figures ( a to d) Shows the effect of segment length on various parameters for lena.bmp (a) (b) (c) (d) Following Figures (e to h) shows the effect of segment length on various parameters for rocket.bmp (e)
  • 4. Rahul Joshi, Lokesh Gagnani / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.1291-1294 1294 | P a g e (f) ( g) (h) Figure (a,e) shows the effect of segment length (for 2,4,5) on number of LSB changed. As length of segment is increase number of LSB changed also increase because probability of finding match sequence is decrease as length of segment is increase. Figure (b,f) shows the effect of segment length (for 2,4,5) on SNR. As length of segment is increase value of SNR is decrease due to number of LSB changed increase. This is also true for rocket.bmp Figure (c,g) shows the effect of segment length (for 2,4,5) on PSNR. As length of segment is increase value of PSNR is decrease due to number of LSB changed increase. Figure (d,h) shows the effect of segment length (for 2,4,5) on Time required to hide message in image. As length of segment is increase time required to hide message is decrease because number of segments is decrease .so time spend to search match sequence is also reduced. VI CONCLUTION The main purpose of this method is to decrease the number of LSB that are changed and as a result increase the immunity of the stego- image against the attack by human visual system (HVS). The problem of the proposed LSB Method is time required to hiding message that is spend during the search to find the best matching when using a large size stego-image. Implementation of this method for Audio and Video Steganography will considered as a future work. REFERENCES [1] Moerland, T., “Steganography and Steganalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/ tmoerl/privtech.pdf [2] Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004 [3] Dunbar, B., “Steganographic techniques and their use in an Open-Systems environment”, SANS Institute, January 2002 [4] Artz, D., “Digital Steganography: Hiding Data within Data”, IEEE Internet Computing Journal, June 2001