SlideShare a Scribd company logo
1 of 3
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 356
Implementation of LSB-Based Image Steganography Method for
Effectiveness of Data Hiding Capacity
Dipak Parikh1
Prof. Anurag Rishishwar2
Prof. Manish Trivedi3
1,2,3
RKDF Institute of Science & Technology, Bhopal, Madhya Pradesh
Abstract— Increased use of electronic communication has
given birth to new ways of transmitting information
securely. Steganography is a science of hiding information
by embedding it in some other data called host message.
Images are most known objects for steganography. The host
message before steganography and stego message after
steganography have the same characteristics. The given
work is to be done by evaluating it on MATALAB. While
evaluation one can calculate SNR, PSNR and BER for
individual information Bit for conceal bit and analysis effect
on results.
Keywords: Steganography, SNR, PSNR, BER
I. INTRODUCTION
Steganography is an art of practice of concealing a message,
image or file within another message, image or file.
Steganos meaning is “covered, concealed or protected” and
graphein meaning “writing”. Hidden message may be in
invisible ink between the visible lines of private letter.
Steganography is an art of hiding some secret message in
another message without letting anyone know about
presence of secret information except the intended receiver.
The message used to hide secret information is known as
host message or cover information. Steganography includes
concealment of information within computer files. A large
redundant bit is present in digital image. Hence digital
images are popular cover objects for steganography [2]. A
digital image mentioned using 2 -D matrix of color
intensities at each grid point. i. e. called pixel. A gray
images uses 8 bits while colored uses 24 bits to describe
color model e.g. RGB. There are many methods to conceal
information inside a cover image. Spatial domain techniques
use the pixel gray levels and their color values directly for
encoding message bits. These methods are simplest in terms
of embedding and extraction complexity. Major drawbacks
of these methods are amount of additive noise that creeps in
a image which directly affects peak signal to noise ratio and
statistical properties of image. Moreover these embedding
algorithms are applicable mainly to lossless image
compression schemes like TIFF images. LSB (least
significant bit) is a major method in spatial domain image
steganography. The transform domain methods embed the
message in frequency domain of cover image. Spatial
domain technique have large capacity and easily
detectable. [3], [4]. While frequency based steganography
has higher PSNR (peak signal to noise ratio) and is more
protected but it is more secure [2] but more complex and
requires more calculations. Thus STEGO MESSAGE [9] =
HOST MESSAGE + COVER OBJECT (which hides secret
message) + STEGO OBJECT (cover object with a message
embedded in it).
II. LSB BASED IMAGE STEGANOGRAPHY [8]
Fig. 1: Block diagram of Steganography
Figure 1 shows the fundamental block diagram of
Steganography. The LSB is the lowest significant bit in the
byte value of the image pixel. The LSB based image
steganography embeds the secret in the least significant bits
of pixel values of the cover image (CVR). To illustrate LSB
technique, we provide the following example. Suppose the
CVR has the following two pixel values:
(0000 1010 0011 0010 0111 0100)
(1111 0101 1100 0011 1100 0111)
Also, from [1] assume that the secret bits are:
101101. After embedding the secret bits, the result pixel
values are:
(0000 1011 0011 0010 0111 0101)
(1111 0101 1100 0010 1100 0111)
The bold written bits convey us that the bits were
Implementation of LSB-Based Image Steganography Method for Effectiveness of Data Hiding Capacity
(IJSRD/Vol. 2/Issue 08/2014/081)
All rights reserved by www.ijsrd.com 357
differing from their original value. Only three bits in the
cover image were changed. On average about half of the bits
in the cover image will be changed when embedding the
secret image.
The above LSB method limits the length of the
secret message to eighth of the size of the CVR. LSB
steganography minimize n-bits to increase the capacity of
the secret information n/8 the size of the CVR. However,
increasing n disturbs stego-image. In each run, we embed
random data in the n minimum significant bits, where
1≤n≤7. However, we need to introduce the methods to see
the resolution and disturbance in images [1].
To measure the imperceptibility of steganography
several metrics are used. The metrics indicates how similar
(or different) the stego-image compared with CVR.
The following metrics are used in the literature
including the work of [5]:
Mean Squared Error (MSE) is calculated by
comparing byte by byte of the CVR and Stego-image. The
calculation can be expressed as follows:
MSE 
1
1
M
1
N
fij  gij 22.1
M  N
Where M, N are the number of rows and columns
in the CVR matrix, fij is the pixel value from CVR, and gij is
the pixel value from the stego-image. Higher value of MSE
indicates differences of compared images.
Bit error rate (BER) calculates the actual bit
positions of number which are changed in the stego-image
compared with CVR.
Peak signal-to-noise ratio measures in decibels the
resolution of the stego-image compared with the CVR. The
higher PSNR is the better the resolution. PSNR is calculated
by following formula:
PSNR 10log10
L
2
MSE 2.2
For above LSB of two pixels, we calculate the
three metrics and obtain the following values: MSE=0.5,
BER=0.0625, PSNR=51.1dB. Various n-bit LSB
steganography techniques were calculated, where 1≤n≤8
using Lena [7] images. The image metrics were calculated
for the images across the various LSB experiments.
The result of stego-images is shown in Figure 2-8.
Stepwise checking of the images reveals that the disturbance
is visible for the stego-image for n≥4. For 8-bit LSB, the
image is completely disturbed. The results of the image
metrics are tabulated in Table I.
n-bit LSB SNR BER PSNR(dB)
1-bit 96.6594 0 101.9687
2-bit 86.2455 0 91.5548
3-bit 66.9839 0 72.2932
4-bit 56.7356 0 62.0450
5-bit 47.1585 0 52.4678
6-bit 37.4684 0 42.7777
7-bit 27.6675 0 32.9768
8-bit error Error error
Table 1: Image Matrix For Different LSB Method
From the above results of Table I, we conclude following
data:
 The metrics for both images are equal.
 The error metrics (MSE and BER) increment quickly
with increment of n, especially for n≥5.
 The image resolution of PSNR is above 40 dB for 1-
bit and 2-bit steganography. For images and video,
PSNR ratio between 30dB-50dB is acceptable [6].
Clearly, selecting the appropriate LSB method should
balance trade-offs between capacity (i.e., secret size)
and imperceptibility (i.e., image distortion) carefully.
For our work, we select an LSB method which
combines 2-bit and 3-bit as explained below.
III. SIMULATION RESULTS
The image metrics were calculated for the reproduction of
stegoimage. The results show that the produced clown
stego-image has better PSNR and small error. Overall, the
clown stego-image has similar results to those of Lena
images for the 2/3-LSB case. We perform the 1-bit to 7-bit
hide data for the input message signal as shown in figure 2-
8.
Cover image Stego Image
Fig. 2: Stego. For 1-bit hide
Cover image Stego Image
Fig. 3: Stego. For 2-bit hide
Cover image Stego Image
Fig. 4: Stego. For 3-bit hide
Implementation of LSB-Based Image Steganography Method for Effectiveness of Data Hiding Capacity
(IJSRD/Vol. 2/Issue 08/2014/081)
All rights reserved by www.ijsrd.com 358
Cover image Stego Image
Fig. 5: Stego. For 4-bit hide
Cover image Stego Image
Fig. 6: Stego. For 5-bit hide
Cover image Stego Image
Fig. 7: Stego. For 6-bit hide
Cover image Stego Image
Fig. 8: Stego. For 7-bit hide
IV. CONCLUSION
In this paper, we have analyzed the performance of different
cases of LSB steganography. We may prove that the 2/3-
LSB design gives better image resolution and facilitate
simple memory access. We also presented the results of test
image executed on the hardware implementation. Future
work should focus on hardware implementation of more and
more complex random-based LSB mechanisms, as well as
minimization of the design velocity and power.
REFERENCES
[1] B. Jamil Mohd, S. Abed, T. Al-Hayajneh and S.
Alouneh, “FPGA Hardware of the LSB
Steganography Method”, IEEE Computers, 2012.
[2] T. Morkel, J. Eloff and M. Olivier, "An Overview of
Image Steganography," The Fifth Annual Information
Security South Africa Conference (ISSA2005),
Sandton, South Africa, July 2005.
[3] H. Wang, S. Wang, “Cyber warfare: Steganography
vs. Steganalysis”, Communications of the ACM,
October 2004, Vol. 47, No. 10, pp. 76-82.
[4] E. Walia, P. Jain, Navdeep, “An Analysis of LSB &
DCT based Steganography”, Global Journal of
Computer Science and Technology, April, 2010, Vol.
10, pp. 4-8.
[5] K. Prasad, V. Jyothsna, S. Raju and S. Indraneel,
“High Secure Image Steganography in BCBS
Using DCT and Fractal Compression,”
International Journal of Computer Science and
Network Security, vol. 10, No.4, April 2010.
[6] “Peak Noise to Signal Ratio”. Available:
http://en.wikipedia.org/wiki/Peak_signal-to-
noise_ratio.
[7] “The image database of the signal” [online].
Available: http://sipi.usc.edu/database/
[8] S. Venkatraman, A. Abrham and M. Paprzycki,
“Significance of Steganography on Data Security”,
Proceeding of the International Conference on
Information Technology: coding and computing,
2004.
[9] B.A.Patil, V.A.Chakkarwar, “Review of an improved
audio steganographic technique over LSB through
random based approach”, IOSR Journal of Computer
Engineering, Feb 2013, Vol 9, No.1, pp.33-34.

More Related Content

What's hot

Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Steganalysis of lsb matching steganography
Steganalysis of lsb matching steganographySteganalysis of lsb matching steganography
Steganalysis of lsb matching steganographyAnnsona Ansilon
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganographyAslesha Niki
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis pptOm Vishnoi
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysisPrince Boonlia
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 

What's hot (20)

Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganalysis of lsb matching steganography
Steganalysis of lsb matching steganographySteganalysis of lsb matching steganography
Steganalysis of lsb matching steganography
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Steganography
SteganographySteganography
Steganography
 
Image stegnography and steganalysis
Image stegnography and steganalysisImage stegnography and steganalysis
Image stegnography and steganalysis
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 

Similar to Implementation of LSB-Based Image Steganography Method for effectiveness of Data Hiding Capacity

Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr spaceIJECEIAES
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 

Similar to Implementation of LSB-Based Image Steganography Method for effectiveness of Data Hiding Capacity (20)

Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
C010511420
C010511420C010511420
C010511420
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Color image steganography in YCbCr space
Color image steganography in YCbCr spaceColor image steganography in YCbCr space
Color image steganography in YCbCr space
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
C010231217
C010231217C010231217
C010231217
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 

Implementation of LSB-Based Image Steganography Method for effectiveness of Data Hiding Capacity

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 356 Implementation of LSB-Based Image Steganography Method for Effectiveness of Data Hiding Capacity Dipak Parikh1 Prof. Anurag Rishishwar2 Prof. Manish Trivedi3 1,2,3 RKDF Institute of Science & Technology, Bhopal, Madhya Pradesh Abstract— Increased use of electronic communication has given birth to new ways of transmitting information securely. Steganography is a science of hiding information by embedding it in some other data called host message. Images are most known objects for steganography. The host message before steganography and stego message after steganography have the same characteristics. The given work is to be done by evaluating it on MATALAB. While evaluation one can calculate SNR, PSNR and BER for individual information Bit for conceal bit and analysis effect on results. Keywords: Steganography, SNR, PSNR, BER I. INTRODUCTION Steganography is an art of practice of concealing a message, image or file within another message, image or file. Steganos meaning is “covered, concealed or protected” and graphein meaning “writing”. Hidden message may be in invisible ink between the visible lines of private letter. Steganography is an art of hiding some secret message in another message without letting anyone know about presence of secret information except the intended receiver. The message used to hide secret information is known as host message or cover information. Steganography includes concealment of information within computer files. A large redundant bit is present in digital image. Hence digital images are popular cover objects for steganography [2]. A digital image mentioned using 2 -D matrix of color intensities at each grid point. i. e. called pixel. A gray images uses 8 bits while colored uses 24 bits to describe color model e.g. RGB. There are many methods to conceal information inside a cover image. Spatial domain techniques use the pixel gray levels and their color values directly for encoding message bits. These methods are simplest in terms of embedding and extraction complexity. Major drawbacks of these methods are amount of additive noise that creeps in a image which directly affects peak signal to noise ratio and statistical properties of image. Moreover these embedding algorithms are applicable mainly to lossless image compression schemes like TIFF images. LSB (least significant bit) is a major method in spatial domain image steganography. The transform domain methods embed the message in frequency domain of cover image. Spatial domain technique have large capacity and easily detectable. [3], [4]. While frequency based steganography has higher PSNR (peak signal to noise ratio) and is more protected but it is more secure [2] but more complex and requires more calculations. Thus STEGO MESSAGE [9] = HOST MESSAGE + COVER OBJECT (which hides secret message) + STEGO OBJECT (cover object with a message embedded in it). II. LSB BASED IMAGE STEGANOGRAPHY [8] Fig. 1: Block diagram of Steganography Figure 1 shows the fundamental block diagram of Steganography. The LSB is the lowest significant bit in the byte value of the image pixel. The LSB based image steganography embeds the secret in the least significant bits of pixel values of the cover image (CVR). To illustrate LSB technique, we provide the following example. Suppose the CVR has the following two pixel values: (0000 1010 0011 0010 0111 0100) (1111 0101 1100 0011 1100 0111) Also, from [1] assume that the secret bits are: 101101. After embedding the secret bits, the result pixel values are: (0000 1011 0011 0010 0111 0101) (1111 0101 1100 0010 1100 0111) The bold written bits convey us that the bits were
  • 2. Implementation of LSB-Based Image Steganography Method for Effectiveness of Data Hiding Capacity (IJSRD/Vol. 2/Issue 08/2014/081) All rights reserved by www.ijsrd.com 357 differing from their original value. Only three bits in the cover image were changed. On average about half of the bits in the cover image will be changed when embedding the secret image. The above LSB method limits the length of the secret message to eighth of the size of the CVR. LSB steganography minimize n-bits to increase the capacity of the secret information n/8 the size of the CVR. However, increasing n disturbs stego-image. In each run, we embed random data in the n minimum significant bits, where 1≤n≤7. However, we need to introduce the methods to see the resolution and disturbance in images [1]. To measure the imperceptibility of steganography several metrics are used. The metrics indicates how similar (or different) the stego-image compared with CVR. The following metrics are used in the literature including the work of [5]: Mean Squared Error (MSE) is calculated by comparing byte by byte of the CVR and Stego-image. The calculation can be expressed as follows: MSE  1 1 M 1 N fij  gij 22.1 M  N Where M, N are the number of rows and columns in the CVR matrix, fij is the pixel value from CVR, and gij is the pixel value from the stego-image. Higher value of MSE indicates differences of compared images. Bit error rate (BER) calculates the actual bit positions of number which are changed in the stego-image compared with CVR. Peak signal-to-noise ratio measures in decibels the resolution of the stego-image compared with the CVR. The higher PSNR is the better the resolution. PSNR is calculated by following formula: PSNR 10log10 L 2 MSE 2.2 For above LSB of two pixels, we calculate the three metrics and obtain the following values: MSE=0.5, BER=0.0625, PSNR=51.1dB. Various n-bit LSB steganography techniques were calculated, where 1≤n≤8 using Lena [7] images. The image metrics were calculated for the images across the various LSB experiments. The result of stego-images is shown in Figure 2-8. Stepwise checking of the images reveals that the disturbance is visible for the stego-image for n≥4. For 8-bit LSB, the image is completely disturbed. The results of the image metrics are tabulated in Table I. n-bit LSB SNR BER PSNR(dB) 1-bit 96.6594 0 101.9687 2-bit 86.2455 0 91.5548 3-bit 66.9839 0 72.2932 4-bit 56.7356 0 62.0450 5-bit 47.1585 0 52.4678 6-bit 37.4684 0 42.7777 7-bit 27.6675 0 32.9768 8-bit error Error error Table 1: Image Matrix For Different LSB Method From the above results of Table I, we conclude following data:  The metrics for both images are equal.  The error metrics (MSE and BER) increment quickly with increment of n, especially for n≥5.  The image resolution of PSNR is above 40 dB for 1- bit and 2-bit steganography. For images and video, PSNR ratio between 30dB-50dB is acceptable [6]. Clearly, selecting the appropriate LSB method should balance trade-offs between capacity (i.e., secret size) and imperceptibility (i.e., image distortion) carefully. For our work, we select an LSB method which combines 2-bit and 3-bit as explained below. III. SIMULATION RESULTS The image metrics were calculated for the reproduction of stegoimage. The results show that the produced clown stego-image has better PSNR and small error. Overall, the clown stego-image has similar results to those of Lena images for the 2/3-LSB case. We perform the 1-bit to 7-bit hide data for the input message signal as shown in figure 2- 8. Cover image Stego Image Fig. 2: Stego. For 1-bit hide Cover image Stego Image Fig. 3: Stego. For 2-bit hide Cover image Stego Image Fig. 4: Stego. For 3-bit hide
  • 3. Implementation of LSB-Based Image Steganography Method for Effectiveness of Data Hiding Capacity (IJSRD/Vol. 2/Issue 08/2014/081) All rights reserved by www.ijsrd.com 358 Cover image Stego Image Fig. 5: Stego. For 4-bit hide Cover image Stego Image Fig. 6: Stego. For 5-bit hide Cover image Stego Image Fig. 7: Stego. For 6-bit hide Cover image Stego Image Fig. 8: Stego. For 7-bit hide IV. CONCLUSION In this paper, we have analyzed the performance of different cases of LSB steganography. We may prove that the 2/3- LSB design gives better image resolution and facilitate simple memory access. We also presented the results of test image executed on the hardware implementation. Future work should focus on hardware implementation of more and more complex random-based LSB mechanisms, as well as minimization of the design velocity and power. REFERENCES [1] B. Jamil Mohd, S. Abed, T. Al-Hayajneh and S. Alouneh, “FPGA Hardware of the LSB Steganography Method”, IEEE Computers, 2012. [2] T. Morkel, J. Eloff and M. Olivier, "An Overview of Image Steganography," The Fifth Annual Information Security South Africa Conference (ISSA2005), Sandton, South Africa, July 2005. [3] H. Wang, S. Wang, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, October 2004, Vol. 47, No. 10, pp. 76-82. [4] E. Walia, P. Jain, Navdeep, “An Analysis of LSB & DCT based Steganography”, Global Journal of Computer Science and Technology, April, 2010, Vol. 10, pp. 4-8. [5] K. Prasad, V. Jyothsna, S. Raju and S. Indraneel, “High Secure Image Steganography in BCBS Using DCT and Fractal Compression,” International Journal of Computer Science and Network Security, vol. 10, No.4, April 2010. [6] “Peak Noise to Signal Ratio”. Available: http://en.wikipedia.org/wiki/Peak_signal-to- noise_ratio. [7] “The image database of the signal” [online]. Available: http://sipi.usc.edu/database/ [8] S. Venkatraman, A. Abrham and M. Paprzycki, “Significance of Steganography on Data Security”, Proceeding of the International Conference on Information Technology: coding and computing, 2004. [9] B.A.Patil, V.A.Chakkarwar, “Review of an improved audio steganographic technique over LSB through random based approach”, IOSR Journal of Computer Engineering, Feb 2013, Vol 9, No.1, pp.33-34.