SlideShare a Scribd company logo
1 of 7
Download to read offline
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 2 Issue 7ǁ July. 2013 ǁ PP.36-42
www.ijesi.org 36 | Page
Steganography Method Based On Data Embedding By Sudoku
Solution Matrix
1,
Suman Chakraborty,
2,
Prof. Samir K. Bandyopadhyay
1,
B.P. Poddar Institute of Management and Technology, 137 V.I.P. Road,
Kolkata – 700052, India.
2,
Department of Computer Science and Engineer, University of Calcutta,
92 A.P.C. Road, Kolkata-700009, India
ABSTRACT : In this paper propose a novel staganography method based on data embedding. Embedding is
done by Sudoku solution matrix. In this scheme RGB value of Cover-image contains both Secret information and
key (Sudoku ) .RG component contains Secret information and B component contains key value. Same Sudoku
solution matrix is used for embedding and extraction phase. To increase the capacity of embedding, Secret
information compressed by DNA sequence compression. Four DNA sequence compression technique has been
used to achieve the desire rate of compression.
KEY WORDS: DNA sequence, Compression, Cover-image, Base-9 form, Embedding, Sudoku matrix,
Secret information, Extraction, RGB.
I. INTRODUCTION
Using digital images as cover media to conceal secret data is an important issue for secret data delivery
applications. From the target of image modification, information hiding techniques can be classified into three
domains, namely spatial domain [1], compressed domain [2], and transformed domain [3]. In spatial domain,
more redundant spaces are available to secret data embedding so high embedding capacity can be achieved, and
less time is needed for embedding and extracting procedures. However, information hiding schemes in spatial
domain are vulnerable to common attacks such as statistical stego analysis. So security in steganography can be
achieved using different embedding schemes [4-5]. The important factors needed to consider when we are
designing a new information hiding scheme are embedding capacity (i.e. the number of secret bits can be
embedded into one cover image pixel), visual quality of stego images [6] (i.e. image distortion); amount of data
sent (i.e. compression) and secure exchange of data (i.e. Encryption). Desirably, one would want to achieve high
embedding capacity, good visual quality, and more data to get embedded and high security. However,
embedding capacity and visual quality are inversely proportional to each other. That is, if embedding capacity is
increased, then visual quality is decreased and vice versa. Thus, a tradeoff between embedding capacity and
visual quality is made by users for different applications. The security and embedding more data can be done
using encryption and compression.
DNA sequence, the information in DNA possess some interesting properties which can be utilized to
hide data as a code prepared up of four chemical bases (A,C,G,T) : adenine (A), guanine (G), cytosine (C), and
thymine (T). Conventionally, data hiding approaches frequently implant a secret message into the congregation
images. However, this could deform the congregation image to some degree, and may therefore; medicinal
effectiveness and susceptibility for solving complex, highly comparable computational problems have also been
demonstrated. The capability to hide, gloss information, and watermarks within this intermediate is clearly
meaningful. The order, or sequence, of these bases determines the information accessible for structuring and
preserving an organism, comparable to the technique in which correspondence of the alphabet come into vision
in a certain categorize to form sentence and words. DNA bases join up with both together, A with T and C with
G, to configure units called base pairs that can promote greatly from a data hiding scheme, and a bit of
surroundings in retroviral DNA sequences is required to understand this method. Each base is also closed to a
sugar molecule and a phosphate molecule [7].
A massage representing a DNA sequence, with the combination of a, c, t, g is equivalent to DNA
sequence of the original data. Compressing the DNA sequence by-1) 2-bits encoding method, 2) Exact matching
method, 3) Approximate matching method, 4)For the approximate matching method. These compression
techniques would be produce equivalent digital form of the DNA sequence and one of procedure will produce
minimum number of bits [8-9].
Steganography Method Based On Data…
www.ijesi.org 37 | Page
Sudoku, English pronunciation soo-DOH-koo is a logic-based, combinatorial number-placement
puzzle. The proposed method derives the secret data and generates the meaningful image steganography using
DNA sequence and sudoku .The objective of this game is to filled a 9×9 grid with the digits so that each of
column, each of row, and all of the nine 3×3 sub-grids that compose of the grid contains all of the digits from 1
to 9. A partially completed grid produced by the puzzle setter which typically has a unique solution. For
example, the same single integer may not appear twice in the same 9×9 playing board row or column or in any
of the nine 3×3 sub regions of the 9×9 playing board [10]. Figure 1 shows a puzzle and Figure 2 indicates its
solution.
Fig-1: A Puzzle [10] Fig-2: Solve Puzzle [10]
In this paper proposed a staganography process which changed minimum in RGB value of pixels of Cover-
image after embedding the secret data. In Embedding procedure Sudoku matrix act as Key. Specialty of this
method is secret information and key both are embedded into Cover-image .So, key(Sudoku matrix) isn’t
required to send separately. Another important aspect is secret information embedding after DNA compression
which increases security and less no. of bits required to embed. The remainder of the paper is organized as
follows. In Section 2 described related work, In Section 3, the description of the proposed steganography in flow
diagram is presented. In Section 4, the description of the proposed embedding procedure is presented. In Section
5, , the description of the proposed steganography algorithm.In Section 6,conclution.
II. RELATED WORK
2.1data Embedding
Steganography using Sudoku is used to hide data or secret information onto an image using Sudoku
solution. The image used in our proposed method is a 24 bit colored image. Initially the data to be hidden is
chosen which can be any digital media file such as text, image, audio, video etc. Sudoku solution is taken and
every value in it is subtracted by ‘1’. This is done so as to ensure all values lie between 0 and 8 in Sudoku so as
to maintain compatibility between Sudoku and secret data which is a three bit value from the input data. 9x9
Sudoku is used as reference matrix M for both data embedding and extraction. Before embedding, one or more
media files are compressed and encrypted to increase the efficiency and security of the method. DES technique
is used for encrypting.
Any image onto which secret data has to be embedded is chosen. Two pixels of this image are chosen
and RGB values of both the pixels are paired as C1(R1,G1), C2(B1, R2), C3(G2, B2) we can generalize each
pair as Ci(x, y). For each pair Pi.x =Ci.x % 9, pi.y = Ci.y % 9 Then Pi.x and Pi.y are chosen as X-axis and Y-
axis components of reference matrix M. Then three candidate elements Horizontal (CEH), Vertical (CEV) and
Boxed (CEB) are chosen. Here CEH is shown by green line, CEV sis shown by purple line and CEB is shown
by black square in Figure 5. CEH and CEB are chosen so that M (Pi.x, Pi.y) from M is put in middle position of
the candidate element array. The remaining positions are filled by respective left and right elements from
position of M (Pi.x, Pi.y) in reference matrix. The difference in index positions of secret digit and M (Pi.x, Pi.y)
is always less than or equal to 4 reducing the distortion in cover image.
Initialization of CEH:
For (i: 0 to 8)
pos = (i+4) %9
CEH [pos] = M (Pi.x, Pi.y)
Pi.x = (Pi.x+1) %9
End For
Initialization of CEV:
Steganography Method Based On Data…
www.ijesi.org 38 | Page
For (i: 0 to 8)
pos = (i+4) %9
CEV [pos] = M (Pi.x, Pi.y)
Pi.y = (Pi.y+1) %9
End for
Figure 5: Illustration of CEH (green line), CEV (purple line), CEB (black square)
Pi.x = Ci.x%9
Pi.y = Ci.y%9
Initialization of CEB:
For (i: 0 to 2)
For (j: 0 to 2)
posx = |_ Pi.x/3_|*3
posy = |_ Pi.y/3_|*3
CEB [posx] [posy] = M (Pi.x, Pi.y)
posx++
End for
posy++
End for
Selecting optimum modified pixel value:
Positional Difference between Si and M (Pi.x, Pi.y) in CEH
Find the position of Si in CEH say it as pos.
DH=pos-4
Positional Difference between Si and M (Pi.x, Pi.y) in CEV
Find the position of Si in CEV say it as pos.
DV=pos-4
Find the position of Si in CEB say it as posx and posy.
SQX=posx-(Pi.x%3)
SQY=posy-(Pi.y%3)
SQD=|SQX|+|SQY|
The minimum distance is calculated by,
Min=minimum (|DH|, |DV|, SQD)
If min =|SQD| Ci.x = Ci.x + SQX
Ci.y = Ci.y + SQY
Else If min=|DH| Ci.x= Ci.x+ DH
Else min=|DV| Ci.y =Ci.y + DV
If Ci.x<0 Ci.x=9+Ci.x or Ci.x>255 Ci.x=Ci.x-9.
If Ci.y<0 Ci.y=9+Ci.y or Ci.y>255 Ci.y=Ci.x-9.
Steganography Method Based On Data…
www.ijesi.org 39 | Page
As in above Fig 5 Pi.x=6, Pi.y=3, so M (Pi.x, Pi.y) = 4 and Si=8.
The candidates elements are selected as CEH= {7, 2, 5, 1, 4, 6, 3, 8, 0},
CEV= {0, 6, 7, 8, 4, 5, 2, 1, 3}, CEB={{4,6,3},{5,0,7},{2,1,8}}.
Here DH=7-4=3, DV=3-4= -1, SQX=8-6=2 & SQY=5-3=2.
SQD=SQX+SQY=2+2=4. Min=minimum{|DH|,|DV|,|SQD|}=minimum{3,1,4}=1,
So Ci.x=Ci.x Ci.y=Ci.x+DV.
As a result 9 bits are embedded in two pixels. Similarly apply above method for C2 & C3. The above
method ensures the each component of pixel is modified maximum by 4 when its value is greater than 3 and less
than 252. Repeat the above procedure until the data gets embedded in cover image, if cover image is not big
enough to hold all the data then new cover image should be used until all the data is embedded. Figure 6 shows
images before embedding and after embedding. The first 10 pixels of cover image are reserved to embed the
size of input data file which is a zip file consisting of variable input media data files. If a cover image can’t
embed all input data file then remaining data is embedded in new images until all the data is embedded. Sudoku
solution is encrypted and then it is embedded using the LSB method in which 3 bits of encrypted Sudoku is
embedded so that each bit is at least significant bit of R, G, and B component of cover image pixel. [11]
2.2Data extraction
Two pixels of this image are chosen and RGB values of both the pixels are paired as C1 (R1, G1), C2
(B1, R2), C3 (G2, B2) we can generalize each pair as Ci(x, y).
For each pair
Pi.x =Ci.x % 9, Pi.y = Ci.y % 9
Then Pi.x and Pi.y are chosen as X-axis and Y-axis of reference matrix M. M (Pi.x, Pi.y) is secret data
extracted. This process is repeated for C1 and C2 pairs .Then again the whole process is repeated till the
required size of secret data is retrieved which is obtained from extracting ten pixels of first cover
image.Encrypted Sudoku solution from the received cover image is extracted from LSB of R, G and B
components of cover image. The pixels from cover image are used for extraction until size of encrypted Sudoku
is obtained which is embedded in cover image. Sudoku solution is retrieved by decrypting Encrypted
Sudoku.[11]
Binary Nucleotide
00 A
01 C
10 G
11 T
Table-1.Binary to Nucleotide mapping
III. FLOW DIAGRAM OF STAGANOGRAPHY PROCESS
In this proposed method Secret-information converted into Base-9 form, after compression.DNA
sequence compression technique has been used for compression. Following flow diagram showing the pictorial
representation of proposed method.
Steganography Method Based On Data…
www.ijesi.org 40 | Page
IV. PROPOSED METHOD
In this Steganography process Sudoku is used as key to hide data or secret information onto an image.
RGB color image used as Cover media. Secret information can be any form of digital media, such as text,
image, audio, video etc.Sudoku solution matrix converted into Base-9 form by subtracted 1 from all values. 9x9
Sudoku solution matrix (M) is used as key for both data embedding and extraction. Here M is called reference
matrix. Before embedding, one or more media files are compressed and encrypted to increase the efficiency and
security of the method. DNA sequence compression is used for encrypting.
4.1Secret Information embedding
Any image onto which secret data has to be embedded is chosen. Two pixels of this image are chosen
and RG values of both the pixels are paired as C1(R1,G1), C2(R2, G2), C3(R3, G3) we can generalize each pair
as Ci(x, y). For each pair Pi.x =Ci.x % 9, pi.y = Ci.y % 9 Then Pi.x and Pi.y are chosen as X-axis and Y-axis
components of reference matrix M. Then three candidate elements Horizontal (CEH), Vertical (CEV) and
Boxed (CEB) are chosen. Here CEH is shown by green line, CEV sis shown by purple line and CEB is shown
by black square in Figure 5. CEH and CEB are chosen so that M (Pi.x, Pi.y) from M is put in middle position of
the candidate element array. The remaining positions are filled by respective left and right elements from
position of M (Pi.x, Pi.y) in reference matrix. The difference in index positions of secret digit and M (Pi.x, Pi.y)
is always less than or equal to 4 reducing the distortion in cover image.
Initialization of CEH:
For (i: 0 to 8)
pos = (i+4) %9
CEH [pos] = M (Pi.x, Pi.y)
Pi.x = (Pi.x+1) %9
End For
Initialization of CEV:
For (i: 0 to 8)
pos = (i+4) %9
CEV [pos] = M (Pi.x, Pi.y)
Pi.y = (Pi.y+1) %9
Secret
Information
Binary
form
DNA
sequence
Compression
Binary form
Decimal
form
DNA
sequence
Base 9 form
Sudoku
Matrix
Embedding Procedure
Send Stago-Image
Cover-Image
Steganography Method Based On Data…
www.ijesi.org 41 | Page
End for
Pi.x = Ci.x%9
Pi.y = Ci.y%9
Initialization of CEB:
For (i: 0 to 2)
For (j: 0 to 2)
posx = |_ Pi.x/3_|*3
posy = |_ Pi.y/3_|*3
CEB [posx] [posy] = M (Pi.x, Pi.y)
posx++
End for
posy++
End for
Selecting optimum modified pixel value:
Positional Difference between Si and M (Pi.x, Pi.y) in CEH
Find the position of Si in CEH say it as pos.
DH=pos-4
Positional Difference between Si and M (Pi.x, Pi.y) in CEV
Find the position of Si in CEV say it as pos.
DV=pos-4
Find the position of Si in CEB say it as posx and posy.
SQX=posx-(Pi.x%3)
SQY=posy-(Pi.y%3)
SQD=|SQX|+|SQY|
The minimum distance is calculated by,
Min=minimum (|DH|, |DV|, SQD)
If min =|SQD| Ci.x = Ci.x + SQX
Ci.y = Ci.y + SQY
Else If min=|DH| Ci.x= Ci.x+ DH
Else min=|DV| Ci.y =Ci.y + DV
If Ci.x<0 Ci.x=9+Ci.x or Ci.x>255 Ci.x=Ci.x-9.
If Ci.y<0 Ci.y=9+Ci.y or Ci.y>255 Ci.y=Ci.x-9.
As in above Fig-5 Pi.x=6, Pi.y=3, so M (Pi.x, Pi.y) = 4 and Si=8.
The candidates elements are selected as CEH= {7, 2, 5, 1, 4, 6, 3, 8, 0},
CEV= {0, 6, 7, 8, 4, 5, 2, 1, 3}, CEB={{4,6,3},{5,0,7},{2,1,8}}.
Here DH=7-4=3, DV=3-4= -1, SQX=8-6=2 & SQY=5-3=2.
SQD=SQX+SQY=2+2=4. Min=minimum {|DH|,|DV|,|SQD|}=minimum{3,1,4}=1,
So Ci.x=Ci.x Ci.y=Ci.x+DV.
As a result 9 bits are embedded in two pixels. Similarly apply above method for C2 & C3. The above method
ensures the each component of pixel is modified maximum by 4 when its value is greater than 3 and less than
252. Repeat the above procedure until the data gets embedded in cover image.Sudoku solution is encrypted and
then it is embedded using the LSB method in which 2 bits of encrypted Sudoku is embedded so that 2 bits is at
least significant bits of B component of cover image pixel.
4.2Data extraction
Two pixels of this image are chosen and RG values of both the pixels are paired as C1 (R1, G1), C2 (
R2,G2), C3 (R3,G3) we can generalize each pair as Ci(x, y).
For each pair
Pi.x =Ci.x % 9, Pi.y = Ci.y % 9
Then Pi.x and Pi.y are chosen as X-axis and Y-axis of reference matrix M. M (Pi.x, Pi.y) is secret data extracted.
This process is repeated for C1 and C2 pairs .Then again the whole process is repeated till the required size of
secret data is retrieved which is obtained from extracting ten pixels of first cover image.
Steganography Method Based On Data…
www.ijesi.org 42 | Page
Encrypted Sudoku solution from the received cover image is extracted from LSB of B component of cover
image. The pixels from cover image are used for extraction until size of encrypted Sudoku is obtained which is
embedded in cover image. Sudoku solution is retrieved by decrypting Encrypted Sudoku.
V. STAGANOGRAPHY ALGORITHM
[1] Change the Secret information into DNA sequence by Table-1.
[2] Compress DNA sequence by one of four compression techniques which will provide minimum no. of
bits.
[3] Convert this binary form into decimal form and from decimal form to Base-9 form.
[4] Embedding Secret information and Sudoku matrix.
[5] Send Stago-image.
Output of this algorithm:
Before Embedding After Embedding
VI. CONCLUSION
Secret information can be any form of digital media, such as text, image, audio, video etc. Sudoku
solution matrix converted into Base-9 form by subtracted 1 from all values. Same Sudoku solution matrix is
used for embedding and extraction phase. To increase the capacity of embedding, Secret information is
compressed by DNA sequence compression. Four DNA sequence compression technique has been used to
achieve the desire rate of compression. The output is encouraging.
VII. REFERENCES
[1] C.-C. Chang, T. D. Kieu, and Y.-C. Chou. High capacity data hiding for gray scale images. In Proceedings of the
[2] First International Conference on Ubiquitous Information Management and Communication, pages 139–148.
Seoul,
[3] Korea, February 2007.
[4] C.-C. Chang and C.-Y. Lin. Reversible steganography for vq- compressed images using side matching and
[5] relocation. IEEE Transactions on Information Forensics and Security, 1(4):493–501, 2006.
[6] Y.-T. Wu and F. Y. Shih. Digital watermarking based on chaotic map and reference register. Pattern Recognition,
[7] 40(12):3754–3763, December 2007.
[8] Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li A (2, 3) Threshold Secret Sharing Scheme Using
[9] Sudoku 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing
[10] 978-0-7695-4222-5/10, 2010
[11] C.C. Chang, Y.C. Chou and T.D. Kieu, An Information Hiding Scheme Using Sudoku, Proceedings of the Third
[12] International Conference on Innovative Computing, Information and Control (ICICIC2008), June 2008.
[13] Wien Hong, Tung-Shou Chen, Chih-Wei Shiu, Steganography Using Sudoku Revisited Second International
[14] Symposium on Intelligent Information Technology Application 978-0-7695-3497-8/08, 2008
[15] Prof. Samir Kumar Bandyopadhyay and S Chakraborty, Image Hiding in DNA Sequence Using Arithmetic
[16] Encoding, Journal of Global Research in Computer Science, Volume 2, No.4, April 2011.
[17] M. Crochemore, W. Rytter, Jewels of Stringology, World Scientific, 2002.
[18] European Bioinformatics Institute, <http://www.ebi.ac.uk/>.
[19] http://en.wikipedia.org/wiki/Sudoku.
[20] Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A. Image Steganography using Sudoku Puzzle for Secured
[21] Data Transmission. International Journal of Computer Applications (0975 – 888) Volume 48– No.17, June 2012.

More Related Content

What's hot

Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...IAEME Publication
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Reviewiosrjce
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganographyIAEME Publication
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation IJEEE
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodHimanshu Bal
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2IAEME Publication
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPIOSRJVSP
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...AM Publications,India
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET Journal
 
Data Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterData Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterCSCJournals
 

What's hot (19)

C010231217
C010231217C010231217
C010231217
 
Is3314841490
Is3314841490Is3314841490
Is3314841490
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency Domains
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Reversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A ReviewReversible Watermarking based on Histogram Shifting Modification:A Review
Reversible Watermarking based on Histogram Shifting Modification:A Review
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Lj3420632068
Lj3420632068Lj3420632068
Lj3420632068
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation
 
Reversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting methodReversible data hiding using histogram shifting method
Reversible data hiding using histogram shifting method
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2
 
A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAP
 
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
Quality Measurements of Lossy Image Steganography Based on H-AMBTC Technique ...
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation ModelsIRJET- LS Chaotic based Image Encryption System Via Permutation Models
IRJET- LS Chaotic based Image Encryption System Via Permutation Models
 
Data Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterData Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity Character
 

Viewers also liked

A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Steganography Presented By Prajwal Shrestha
Steganography Presented By Prajwal ShresthaSteganography Presented By Prajwal Shrestha
Steganography Presented By Prajwal ShresthaPrajwalShrestha1
 
Steganography
SteganographySteganography
Steganographysandeipz
 
Operations Research
Operations ResearchOperations Research
Operations Researchajithsrc
 

Viewers also liked (11)

50120130406018
5012013040601850120130406018
50120130406018
 
Steganography
SteganographySteganography
Steganography
 
50120130405006
5012013040500650120130405006
50120130405006
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
Steganography Presented By Prajwal Shrestha
Steganography Presented By Prajwal ShresthaSteganography Presented By Prajwal Shrestha
Steganography Presented By Prajwal Shrestha
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Stegnography
StegnographyStegnography
Stegnography
 
Operations Research
Operations ResearchOperations Research
Operations Research
 
Steganography
SteganographySteganography
Steganography
 

Similar to International Journal of Engineering and Science Invention (IJESI)

Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...IJECEIAES
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsIOSR Journals
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERcscpconf
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...IJMER
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganographyrahulmonikasharma
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionGPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionVartika Sharma
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
 

Similar to International Journal of Engineering and Science Invention (IJESI) (20)

Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
50120130405004 2
50120130405004 250120130405004 2
50120130405004 2
 
A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...A new partial image encryption method for document images using variance base...
A new partial image encryption method for document images using variance base...
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixels
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...Two Stage Reversible Data Hiding Based On Image Interpolation  and Histogram ...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
 
Id62
Id62Id62
Id62
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganography
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_DiffusionGPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
GPU_Based_Image_Compression_and_Interpolation_with_Anisotropic_Diffusion
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

International Journal of Engineering and Science Invention (IJESI)

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 2 Issue 7ǁ July. 2013 ǁ PP.36-42 www.ijesi.org 36 | Page Steganography Method Based On Data Embedding By Sudoku Solution Matrix 1, Suman Chakraborty, 2, Prof. Samir K. Bandyopadhyay 1, B.P. Poddar Institute of Management and Technology, 137 V.I.P. Road, Kolkata – 700052, India. 2, Department of Computer Science and Engineer, University of Calcutta, 92 A.P.C. Road, Kolkata-700009, India ABSTRACT : In this paper propose a novel staganography method based on data embedding. Embedding is done by Sudoku solution matrix. In this scheme RGB value of Cover-image contains both Secret information and key (Sudoku ) .RG component contains Secret information and B component contains key value. Same Sudoku solution matrix is used for embedding and extraction phase. To increase the capacity of embedding, Secret information compressed by DNA sequence compression. Four DNA sequence compression technique has been used to achieve the desire rate of compression. KEY WORDS: DNA sequence, Compression, Cover-image, Base-9 form, Embedding, Sudoku matrix, Secret information, Extraction, RGB. I. INTRODUCTION Using digital images as cover media to conceal secret data is an important issue for secret data delivery applications. From the target of image modification, information hiding techniques can be classified into three domains, namely spatial domain [1], compressed domain [2], and transformed domain [3]. In spatial domain, more redundant spaces are available to secret data embedding so high embedding capacity can be achieved, and less time is needed for embedding and extracting procedures. However, information hiding schemes in spatial domain are vulnerable to common attacks such as statistical stego analysis. So security in steganography can be achieved using different embedding schemes [4-5]. The important factors needed to consider when we are designing a new information hiding scheme are embedding capacity (i.e. the number of secret bits can be embedded into one cover image pixel), visual quality of stego images [6] (i.e. image distortion); amount of data sent (i.e. compression) and secure exchange of data (i.e. Encryption). Desirably, one would want to achieve high embedding capacity, good visual quality, and more data to get embedded and high security. However, embedding capacity and visual quality are inversely proportional to each other. That is, if embedding capacity is increased, then visual quality is decreased and vice versa. Thus, a tradeoff between embedding capacity and visual quality is made by users for different applications. The security and embedding more data can be done using encryption and compression. DNA sequence, the information in DNA possess some interesting properties which can be utilized to hide data as a code prepared up of four chemical bases (A,C,G,T) : adenine (A), guanine (G), cytosine (C), and thymine (T). Conventionally, data hiding approaches frequently implant a secret message into the congregation images. However, this could deform the congregation image to some degree, and may therefore; medicinal effectiveness and susceptibility for solving complex, highly comparable computational problems have also been demonstrated. The capability to hide, gloss information, and watermarks within this intermediate is clearly meaningful. The order, or sequence, of these bases determines the information accessible for structuring and preserving an organism, comparable to the technique in which correspondence of the alphabet come into vision in a certain categorize to form sentence and words. DNA bases join up with both together, A with T and C with G, to configure units called base pairs that can promote greatly from a data hiding scheme, and a bit of surroundings in retroviral DNA sequences is required to understand this method. Each base is also closed to a sugar molecule and a phosphate molecule [7]. A massage representing a DNA sequence, with the combination of a, c, t, g is equivalent to DNA sequence of the original data. Compressing the DNA sequence by-1) 2-bits encoding method, 2) Exact matching method, 3) Approximate matching method, 4)For the approximate matching method. These compression techniques would be produce equivalent digital form of the DNA sequence and one of procedure will produce minimum number of bits [8-9].
  • 2. Steganography Method Based On Data… www.ijesi.org 37 | Page Sudoku, English pronunciation soo-DOH-koo is a logic-based, combinatorial number-placement puzzle. The proposed method derives the secret data and generates the meaningful image steganography using DNA sequence and sudoku .The objective of this game is to filled a 9×9 grid with the digits so that each of column, each of row, and all of the nine 3×3 sub-grids that compose of the grid contains all of the digits from 1 to 9. A partially completed grid produced by the puzzle setter which typically has a unique solution. For example, the same single integer may not appear twice in the same 9×9 playing board row or column or in any of the nine 3×3 sub regions of the 9×9 playing board [10]. Figure 1 shows a puzzle and Figure 2 indicates its solution. Fig-1: A Puzzle [10] Fig-2: Solve Puzzle [10] In this paper proposed a staganography process which changed minimum in RGB value of pixels of Cover- image after embedding the secret data. In Embedding procedure Sudoku matrix act as Key. Specialty of this method is secret information and key both are embedded into Cover-image .So, key(Sudoku matrix) isn’t required to send separately. Another important aspect is secret information embedding after DNA compression which increases security and less no. of bits required to embed. The remainder of the paper is organized as follows. In Section 2 described related work, In Section 3, the description of the proposed steganography in flow diagram is presented. In Section 4, the description of the proposed embedding procedure is presented. In Section 5, , the description of the proposed steganography algorithm.In Section 6,conclution. II. RELATED WORK 2.1data Embedding Steganography using Sudoku is used to hide data or secret information onto an image using Sudoku solution. The image used in our proposed method is a 24 bit colored image. Initially the data to be hidden is chosen which can be any digital media file such as text, image, audio, video etc. Sudoku solution is taken and every value in it is subtracted by ‘1’. This is done so as to ensure all values lie between 0 and 8 in Sudoku so as to maintain compatibility between Sudoku and secret data which is a three bit value from the input data. 9x9 Sudoku is used as reference matrix M for both data embedding and extraction. Before embedding, one or more media files are compressed and encrypted to increase the efficiency and security of the method. DES technique is used for encrypting. Any image onto which secret data has to be embedded is chosen. Two pixels of this image are chosen and RGB values of both the pixels are paired as C1(R1,G1), C2(B1, R2), C3(G2, B2) we can generalize each pair as Ci(x, y). For each pair Pi.x =Ci.x % 9, pi.y = Ci.y % 9 Then Pi.x and Pi.y are chosen as X-axis and Y- axis components of reference matrix M. Then three candidate elements Horizontal (CEH), Vertical (CEV) and Boxed (CEB) are chosen. Here CEH is shown by green line, CEV sis shown by purple line and CEB is shown by black square in Figure 5. CEH and CEB are chosen so that M (Pi.x, Pi.y) from M is put in middle position of the candidate element array. The remaining positions are filled by respective left and right elements from position of M (Pi.x, Pi.y) in reference matrix. The difference in index positions of secret digit and M (Pi.x, Pi.y) is always less than or equal to 4 reducing the distortion in cover image. Initialization of CEH: For (i: 0 to 8) pos = (i+4) %9 CEH [pos] = M (Pi.x, Pi.y) Pi.x = (Pi.x+1) %9 End For Initialization of CEV:
  • 3. Steganography Method Based On Data… www.ijesi.org 38 | Page For (i: 0 to 8) pos = (i+4) %9 CEV [pos] = M (Pi.x, Pi.y) Pi.y = (Pi.y+1) %9 End for Figure 5: Illustration of CEH (green line), CEV (purple line), CEB (black square) Pi.x = Ci.x%9 Pi.y = Ci.y%9 Initialization of CEB: For (i: 0 to 2) For (j: 0 to 2) posx = |_ Pi.x/3_|*3 posy = |_ Pi.y/3_|*3 CEB [posx] [posy] = M (Pi.x, Pi.y) posx++ End for posy++ End for Selecting optimum modified pixel value: Positional Difference between Si and M (Pi.x, Pi.y) in CEH Find the position of Si in CEH say it as pos. DH=pos-4 Positional Difference between Si and M (Pi.x, Pi.y) in CEV Find the position of Si in CEV say it as pos. DV=pos-4 Find the position of Si in CEB say it as posx and posy. SQX=posx-(Pi.x%3) SQY=posy-(Pi.y%3) SQD=|SQX|+|SQY| The minimum distance is calculated by, Min=minimum (|DH|, |DV|, SQD) If min =|SQD| Ci.x = Ci.x + SQX Ci.y = Ci.y + SQY Else If min=|DH| Ci.x= Ci.x+ DH Else min=|DV| Ci.y =Ci.y + DV If Ci.x<0 Ci.x=9+Ci.x or Ci.x>255 Ci.x=Ci.x-9. If Ci.y<0 Ci.y=9+Ci.y or Ci.y>255 Ci.y=Ci.x-9.
  • 4. Steganography Method Based On Data… www.ijesi.org 39 | Page As in above Fig 5 Pi.x=6, Pi.y=3, so M (Pi.x, Pi.y) = 4 and Si=8. The candidates elements are selected as CEH= {7, 2, 5, 1, 4, 6, 3, 8, 0}, CEV= {0, 6, 7, 8, 4, 5, 2, 1, 3}, CEB={{4,6,3},{5,0,7},{2,1,8}}. Here DH=7-4=3, DV=3-4= -1, SQX=8-6=2 & SQY=5-3=2. SQD=SQX+SQY=2+2=4. Min=minimum{|DH|,|DV|,|SQD|}=minimum{3,1,4}=1, So Ci.x=Ci.x Ci.y=Ci.x+DV. As a result 9 bits are embedded in two pixels. Similarly apply above method for C2 & C3. The above method ensures the each component of pixel is modified maximum by 4 when its value is greater than 3 and less than 252. Repeat the above procedure until the data gets embedded in cover image, if cover image is not big enough to hold all the data then new cover image should be used until all the data is embedded. Figure 6 shows images before embedding and after embedding. The first 10 pixels of cover image are reserved to embed the size of input data file which is a zip file consisting of variable input media data files. If a cover image can’t embed all input data file then remaining data is embedded in new images until all the data is embedded. Sudoku solution is encrypted and then it is embedded using the LSB method in which 3 bits of encrypted Sudoku is embedded so that each bit is at least significant bit of R, G, and B component of cover image pixel. [11] 2.2Data extraction Two pixels of this image are chosen and RGB values of both the pixels are paired as C1 (R1, G1), C2 (B1, R2), C3 (G2, B2) we can generalize each pair as Ci(x, y). For each pair Pi.x =Ci.x % 9, Pi.y = Ci.y % 9 Then Pi.x and Pi.y are chosen as X-axis and Y-axis of reference matrix M. M (Pi.x, Pi.y) is secret data extracted. This process is repeated for C1 and C2 pairs .Then again the whole process is repeated till the required size of secret data is retrieved which is obtained from extracting ten pixels of first cover image.Encrypted Sudoku solution from the received cover image is extracted from LSB of R, G and B components of cover image. The pixels from cover image are used for extraction until size of encrypted Sudoku is obtained which is embedded in cover image. Sudoku solution is retrieved by decrypting Encrypted Sudoku.[11] Binary Nucleotide 00 A 01 C 10 G 11 T Table-1.Binary to Nucleotide mapping III. FLOW DIAGRAM OF STAGANOGRAPHY PROCESS In this proposed method Secret-information converted into Base-9 form, after compression.DNA sequence compression technique has been used for compression. Following flow diagram showing the pictorial representation of proposed method.
  • 5. Steganography Method Based On Data… www.ijesi.org 40 | Page IV. PROPOSED METHOD In this Steganography process Sudoku is used as key to hide data or secret information onto an image. RGB color image used as Cover media. Secret information can be any form of digital media, such as text, image, audio, video etc.Sudoku solution matrix converted into Base-9 form by subtracted 1 from all values. 9x9 Sudoku solution matrix (M) is used as key for both data embedding and extraction. Here M is called reference matrix. Before embedding, one or more media files are compressed and encrypted to increase the efficiency and security of the method. DNA sequence compression is used for encrypting. 4.1Secret Information embedding Any image onto which secret data has to be embedded is chosen. Two pixels of this image are chosen and RG values of both the pixels are paired as C1(R1,G1), C2(R2, G2), C3(R3, G3) we can generalize each pair as Ci(x, y). For each pair Pi.x =Ci.x % 9, pi.y = Ci.y % 9 Then Pi.x and Pi.y are chosen as X-axis and Y-axis components of reference matrix M. Then three candidate elements Horizontal (CEH), Vertical (CEV) and Boxed (CEB) are chosen. Here CEH is shown by green line, CEV sis shown by purple line and CEB is shown by black square in Figure 5. CEH and CEB are chosen so that M (Pi.x, Pi.y) from M is put in middle position of the candidate element array. The remaining positions are filled by respective left and right elements from position of M (Pi.x, Pi.y) in reference matrix. The difference in index positions of secret digit and M (Pi.x, Pi.y) is always less than or equal to 4 reducing the distortion in cover image. Initialization of CEH: For (i: 0 to 8) pos = (i+4) %9 CEH [pos] = M (Pi.x, Pi.y) Pi.x = (Pi.x+1) %9 End For Initialization of CEV: For (i: 0 to 8) pos = (i+4) %9 CEV [pos] = M (Pi.x, Pi.y) Pi.y = (Pi.y+1) %9 Secret Information Binary form DNA sequence Compression Binary form Decimal form DNA sequence Base 9 form Sudoku Matrix Embedding Procedure Send Stago-Image Cover-Image
  • 6. Steganography Method Based On Data… www.ijesi.org 41 | Page End for Pi.x = Ci.x%9 Pi.y = Ci.y%9 Initialization of CEB: For (i: 0 to 2) For (j: 0 to 2) posx = |_ Pi.x/3_|*3 posy = |_ Pi.y/3_|*3 CEB [posx] [posy] = M (Pi.x, Pi.y) posx++ End for posy++ End for Selecting optimum modified pixel value: Positional Difference between Si and M (Pi.x, Pi.y) in CEH Find the position of Si in CEH say it as pos. DH=pos-4 Positional Difference between Si and M (Pi.x, Pi.y) in CEV Find the position of Si in CEV say it as pos. DV=pos-4 Find the position of Si in CEB say it as posx and posy. SQX=posx-(Pi.x%3) SQY=posy-(Pi.y%3) SQD=|SQX|+|SQY| The minimum distance is calculated by, Min=minimum (|DH|, |DV|, SQD) If min =|SQD| Ci.x = Ci.x + SQX Ci.y = Ci.y + SQY Else If min=|DH| Ci.x= Ci.x+ DH Else min=|DV| Ci.y =Ci.y + DV If Ci.x<0 Ci.x=9+Ci.x or Ci.x>255 Ci.x=Ci.x-9. If Ci.y<0 Ci.y=9+Ci.y or Ci.y>255 Ci.y=Ci.x-9. As in above Fig-5 Pi.x=6, Pi.y=3, so M (Pi.x, Pi.y) = 4 and Si=8. The candidates elements are selected as CEH= {7, 2, 5, 1, 4, 6, 3, 8, 0}, CEV= {0, 6, 7, 8, 4, 5, 2, 1, 3}, CEB={{4,6,3},{5,0,7},{2,1,8}}. Here DH=7-4=3, DV=3-4= -1, SQX=8-6=2 & SQY=5-3=2. SQD=SQX+SQY=2+2=4. Min=minimum {|DH|,|DV|,|SQD|}=minimum{3,1,4}=1, So Ci.x=Ci.x Ci.y=Ci.x+DV. As a result 9 bits are embedded in two pixels. Similarly apply above method for C2 & C3. The above method ensures the each component of pixel is modified maximum by 4 when its value is greater than 3 and less than 252. Repeat the above procedure until the data gets embedded in cover image.Sudoku solution is encrypted and then it is embedded using the LSB method in which 2 bits of encrypted Sudoku is embedded so that 2 bits is at least significant bits of B component of cover image pixel. 4.2Data extraction Two pixels of this image are chosen and RG values of both the pixels are paired as C1 (R1, G1), C2 ( R2,G2), C3 (R3,G3) we can generalize each pair as Ci(x, y). For each pair Pi.x =Ci.x % 9, Pi.y = Ci.y % 9 Then Pi.x and Pi.y are chosen as X-axis and Y-axis of reference matrix M. M (Pi.x, Pi.y) is secret data extracted. This process is repeated for C1 and C2 pairs .Then again the whole process is repeated till the required size of secret data is retrieved which is obtained from extracting ten pixels of first cover image.
  • 7. Steganography Method Based On Data… www.ijesi.org 42 | Page Encrypted Sudoku solution from the received cover image is extracted from LSB of B component of cover image. The pixels from cover image are used for extraction until size of encrypted Sudoku is obtained which is embedded in cover image. Sudoku solution is retrieved by decrypting Encrypted Sudoku. V. STAGANOGRAPHY ALGORITHM [1] Change the Secret information into DNA sequence by Table-1. [2] Compress DNA sequence by one of four compression techniques which will provide minimum no. of bits. [3] Convert this binary form into decimal form and from decimal form to Base-9 form. [4] Embedding Secret information and Sudoku matrix. [5] Send Stago-image. Output of this algorithm: Before Embedding After Embedding VI. CONCLUSION Secret information can be any form of digital media, such as text, image, audio, video etc. Sudoku solution matrix converted into Base-9 form by subtracted 1 from all values. Same Sudoku solution matrix is used for embedding and extraction phase. To increase the capacity of embedding, Secret information is compressed by DNA sequence compression. Four DNA sequence compression technique has been used to achieve the desire rate of compression. The output is encouraging. VII. REFERENCES [1] C.-C. Chang, T. D. Kieu, and Y.-C. Chou. High capacity data hiding for gray scale images. In Proceedings of the [2] First International Conference on Ubiquitous Information Management and Communication, pages 139–148. Seoul, [3] Korea, February 2007. [4] C.-C. Chang and C.-Y. Lin. Reversible steganography for vq- compressed images using side matching and [5] relocation. IEEE Transactions on Information Forensics and Security, 1(4):493–501, 2006. [6] Y.-T. Wu and F. Y. Shih. Digital watermarking based on chaotic map and reference register. Pattern Recognition, [7] 40(12):3754–3763, December 2007. [8] Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li A (2, 3) Threshold Secret Sharing Scheme Using [9] Sudoku 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing [10] 978-0-7695-4222-5/10, 2010 [11] C.C. Chang, Y.C. Chou and T.D. Kieu, An Information Hiding Scheme Using Sudoku, Proceedings of the Third [12] International Conference on Innovative Computing, Information and Control (ICICIC2008), June 2008. [13] Wien Hong, Tung-Shou Chen, Chih-Wei Shiu, Steganography Using Sudoku Revisited Second International [14] Symposium on Intelligent Information Technology Application 978-0-7695-3497-8/08, 2008 [15] Prof. Samir Kumar Bandyopadhyay and S Chakraborty, Image Hiding in DNA Sequence Using Arithmetic [16] Encoding, Journal of Global Research in Computer Science, Volume 2, No.4, April 2011. [17] M. Crochemore, W. Rytter, Jewels of Stringology, World Scientific, 2002. [18] European Bioinformatics Institute, <http://www.ebi.ac.uk/>. [19] http://en.wikipedia.org/wiki/Sudoku. [20] Sanmitra Ijeri, Shivananda Pujeri, Shrikant B, Usha B A. Image Steganography using Sudoku Puzzle for Secured [21] Data Transmission. International Journal of Computer Applications (0975 – 888) Volume 48– No.17, June 2012.