SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2749
An Improved 2LSB Steganography Technique for Data Transmission
Mr. Dipak U. Chaudhari1, Dr. Sahebrao B. Bagal2
1M.E. (E & Tc), Late G.N. Sapkal, College of Engineering, Nashik, Maharashtra, India
2Principal and Guide, Late G.N. Sapkal, College of Engineering, Nashik, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In this paper message bits are embedded
randomly to achieve the higher security by combining
cryptography and steganography. Cryptography protects the
contents of a message, steganography can be said to protect
both messages and communicating parties. 2LSB technique is
used to improve data capacity in an image. Steganography
means the study of invisible communication.InSteganography
usually hide the existence of the communicated data in such a
way that it remains confidential & it maintains secrecy
between two communicating parties. This paper investigates
how the parity of data can be used effectively to hide a secret
message randomly in the image.
Key Words: Cryptography, Steganography, MSE,PSNR,Two
LSB, Random insertion.
1. INTRODUCTION
In today’s computer world, it is very important to keep
secret information secret, private information private, and
when profits are involved, protect the copyrights of data. To
accomplish these difficult tasks, new methods based on the
principle of steganography is being developed and used.
Many times, a cryptographic message transition gives
unwanted attention. The cryptographic concept may be
restricted for use. Steganography is the combination of art
and science of communicating in a way which hides the
existence of the communication.
Cryptography hides the content of a private message
from a unwanted people, whereas steganography even
conceals the real message. Steganography is commonly
different than cryptography or watermarking [3]. The
relation between them is related in many ways, the
fundamental difference between them in the way they are
defined and application of them for the differentproblemsto
which they are applied. Steganography is different than
cryptography & must not be confused between both, where
we transform the message so as to make it meaning obscure
to unwanted people who intercept it. So, the definition of
breaking the system is different [1].
This technique is based on RGB images. The two least
significant bits of the red channel will be used as an
indication to the existence of hidden data in green and blue
channels. Before embedding the data bits, the parity of the
data has been checked [5]. Then according to the content of
red component data is placed into the pixel. The selection of
pixels to embed was crucial since two controlling elements
are used for modification of pixel. The technique used
random insertion of bits; every pixel doesn’t carry the
message bits, so it is difficult to detect presence of
information in the pixel.
In cryptography, the structure of a message is jumbled
to make it meaningless and unintelligible unless the
decryption key is detected. In other word, steganography
prevents an unwanted recipient from suspecting that the
data exist. A steganographic system thus embeds hidden
content in unexceptional cover media so as not to produce
an eavesdropper’ssuspicion. [1] Asan example, itispossible
to embed a text inside an image or an audio file.
2. PROPOSED SCHEME
The system is broken in cryptography when the hacker can
read the secrete message. To break a steganographicsystem
attacker have to detect that steganography has been used
and he is detect to read the embedded message. RGB image
consist of 3 colors red, green & blue. Image component is
given by equation (1). Here R(x, y) is used as a controlling
element & pair of data bits is embedded into G(x, y) &B(x,y).
For any sequence of message bit pairs (m1, m2) (m3, m4). ..
.. (m i-1,mi) ,we will compare the message bits with current
G(x, y) and B(x, y) and by using table 2 and 3 data bits will
get added into pixels. Whether to embed odd or even parity
data is decided by performing modulus operation on R(x, y)
which is obtained by equation (2).
F(x, y) =R(x, y) + G(x, y)+ B(x, y) …(1)
(R(x, y) + 2) mod (4) = 0 …(2)
If equation (2) satisfies the condition, difference between
message bit pairs & two least significant bits of G(x, y) is
calculated using equation (3). If OE is less than ±2, even
parity data is embedded into G(x, y).
OE=G (b1, b0)-(mi-1, mi) …(3)
Where, b0 and b1 are two least significant bitsof pixel.Same
technique is used for embedding in B(x, y). OE decides
whether to embed or not. If equation (2) doesnot satisfy the
condition, then pair of odd data bitsis embedded. OE is used
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2750
to control embedding data rate. The OE variable affects
probability of embedding payload. For maximum efficiency,
value of OE must be in between -1 to +1. The following steps
are used to embed data in pixels:
Table -1: Embedding scheme
2 LSBs of Red 2 LSBs of Green 2 LSBs of Blue
00
Add even parity
data
Add even parity
data
01
Add odd parity
data
Add odd parity
data
10
Add even parity
data
Add even parity
data
11
Add odd parity
data
Add odd parity
data
Table 1 shows the embedding scheme for message bits if
two least significant bits of red color is divisible by 2 then
and only then embed the even parity bits of the message
Otherwise place the odd parity bits in to the green color and
blue color component of that particular pixel. According to
the following steps,
If data bits are 00 then,
G(x, y) for g00, g10, g11
G(x, y)= …(4)
G(x, y) - 1 for g01
If data bits are 11then
G(x, y ) for g00,g01,g11
G(x, y)= …(5)
G(x, y ) + 1 for g10
For R(x, y) , mod( 2 ) ! = 0 …(6)
If data bits are 01 then
G(x, y ) for g01,g11
G(x, y ) = G(x, y) -1 for g10 …(7)
G(x, y ) + 1 for g00
If data bits are 10 then
G(x, y ) for g10,g00
G(x, y ) = G(x, y ) - 1 for g11 …(8)
G(x, y ) + 1 for g01
Equation (4), (5), (7) and (8) are used to embed the message
bits in to green color. Same equations can be used to
embedding in blue color. We have placed the message bitsin
B(x, y) after performing the operations on G(x, y).
If the contents of R=00, OR 10 and at the same time data bit
s are 00 or 1
Table -2: Embedding scheme when R = 00 OR 10
d00 d11
For G=00 G=G DON’T ADD
For G=01 G=G-1 DON’T ADD
For G=10 DON’T ADD G=G+1
For G=11 DON’T ADD G=G
If the contentsof R=01 OR 11 and at the same time data bits
are 00 or 10
Table -3: Embedding scheme when R = 01 OR 11
d01 d10
For G=00 G=G + 1 DON’T ADD
For G=01 G=G G=G+1
For G=10 G=G -1 G=G
For G=11 DON’T ADD G=G – 1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2751
If equation (6) satisfies the condition & data bits are having
even parity. Then equation (9) can be used to embed the
data. In this case pixel value will be changed without
embedding data bits. This is undesired operation which
helps to degrade the image. But embedding capacity is
increases. Since some of the pixel doesn’t carry any
information, it is difficult to detect the pixelwhichcarriesthe
information. When contents of R are 00 or 11 then add the
message bits without checking any condition. It has been
observed that if we use parity check for R= 00 or 11, around
35 to 40% pixels get wasted, which doesn’t carry the
message bits. Our aim is to provide higher security with
higher embedding rate.
3. EXPERIMENTAL RESULTS
First, different images of same size have been taken for
inserting the same message. And then different messages of
same size have been taken to insert in one image. Some
experiments are also performed on different size of images
and different size of messages. All pixels will not participate
in embedding of message, as embedding of data is depends
on the parity of message bits; the algorithm is tested by two
ways. Experimental result shows that 65 to 74 percent of
pixels contained data.
For embedding data bitsin to image OE must be lessthan ±2,
it is observed that equation (2) limits the embedding rate.
This is because of random insertion. These Images are taken
from www.google.com.
Image 1 Image 2
Image 3 Image 4
Fig -1: Cover images
Image 1 Image 2
Image 3 Image 4
Fig -2: Stego images
3. CALCULATION OF PSNR
In order to avoid the stego-image from being suspected of
hiding secret information in, the quality of the stego-image
should not be degraded significantly. The mean squared
error between the cover image and the stego-image
(embedding distortion) can be used as one of the measures
to assess the relative perceptibility of the embedded text.
[3][6]. Usually, the PSNR (Peak Signal-to-Noise Ratio)
formula is used to evaluate the distortion between the pre-
processing image and the post-processing image.
PSNR = 10 log 10[ ( 2 n – 1 ) / MSE]
The x and y stand for image’sheight and width, respectively.
The Xij and Xiij represent the preprocessing image pixel
value in position (i, j) and the post-processing image pixel
value in position (i, j), respectively. Theoretically, if the
distortion between the preprocessing image and the post
processing image is small, the value of PSNR comes out
larger. Therefore, a larger value of PSNR means that the
processed image has better quality. Usually, if the PSNR
value is greater than or equal to 30 db, the distortion
between the original image and the processed image is not
suspiciousto the human eye the experiment isperformedon
different images to calculate PSNR. The figure 1 shows the
cover images and figure 2 shows the respective stego
images. Cover images are taken from google.com. Table 4
illustrates the PSNR values and mean square error.
MSE =
1
X x Y
∑ ∑ X I J – X I J
I J
X Y 2
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2752
Table -3: PSNR Values of the images
Image MSE PSNR
Image 1 0.7216 39.2678
Image 2 0.8814 36.4343
Image 3 0.7346 37.5528
Image 4 0.7118 42.7283
4. CONCLUSION
In the project, the two least significant bits of pixel will used
to embed the data bits therefore the capacity of the
algorithm will be better. Encryption and steganography can
achieve separate goals. Encryption encodesdata suchthatan
unintended recipient cannot determine its intended
meaning. Since Two LSB’s are used for embedding. Present
method is having high embedding rate. The capacity of the
algorithm is better. Experimental result shows that PSNR
ratios of images are founds to be more than 30dB. Thus
processed images are not suspiciousto the humaneye,along
with this advantage the random insertion method is used.
And thus the transmission of data is highly secured.
REFERENCES
[1] Ishwarjot Singh ,J.P Raina,“ Advance Scheme for Secret
Data Hiding System using Hop feld & LSB” International
Journal of Computer Trendsand Technology(IJCT)–volume
4 Issue 7–July 2013.
[2] G. Manikandan, M. Kamarasan and N. Sairam “A Hybrid
Approach for Security Enhancement by CompressedCrypto-
Stegno Scheme “, Research Journal of Applied Sciences,
Engineering and Technology 4(6): 608-614, 2012
[3] Dumitrescu, S. W. Xiaolin and Z. Wang,2003.Detectionof
LSB steganography via sample pair analysis. In: LNCS, Vol.
2578, Springer-Verlag, New York, pp: 355 -372.
[4] J. Kaur and Sanjeev Kumar, ” Study and Analysis of
Various Image Steganography Techniques”IJSTVol.2Issue3,
September 2011 .
[5] Adnan Gutub, Abdulaziz Tabakh,AyedAl-Qahtani“Triple-
A: Secure RGB Image Steganography Based on
Randomzation”, International Confernce on Computer
Systems and Applicatons (AICCSA-2009),pp:400-403,10-13
May 2009.
[6] Sharp T., “An implementation of key-based digital signal
Steganography” in Pro. Information Hiding
Workshop,Springer LNCS 2137, pp. 13–26, 2001.
[7] Jarno Mielikainen, "LSB Matching Revisited", Signal
Processing Letters, IEEE, Publication : May 2006 Volume :
13, Issue : 5, pp. 285- 287.
[8] Bailey, K., and Curran, K., “An Evaluation of Image Based
Steganography Methods”, Journal of Multimedia Tools and
Applications, Vol. 30, No. 1, pp. 55-88, 2006.
[9] J. Mielikainen, "LSB Matching Revisited" Signal
Processing Letters, IEEE, Publication : May 2006 Volume :
13, Issue : 5, pp. 285- 287.
[10] Sanjeev Kumar & Jagvinder Kaur, ” Study and Analysis
of Various Image Steganography Techniques” IJCST Vol.2,
Issue 3, September 2011
[11] Ahn, L.V. and N.J. Hopper, 2004. Secret-key
steganography. In Lecture Notes in Computer Science.Vol.
3027 /2005 of Advances in Cryptology - EUROCRYPT 2004,
pp: 323–341. Springer-Verlag Heidelberg.
[12] Liu, Fenlin, Yang, Chunfang., Luo, Xiangyang., and Zeng,
Ying., “Pixel Group Trace Model-Based Quantitative
Steganalysis for Multiple LSB Steganography”, IEEE
Transactions on Information Forensics and Security, Vol. 8,
No. 1, January 2013.
[13] N.F Johnson and Jajodia, S., “Exploring
Steganography:Seeing the Unseen”, Computer Journal,
February 2008.
[14] Shabir A. Parah, G.M. Bhat, Javaid A. Sheikh, “Data
Hiding in Intermediate Significant Bit Planes, A High
Capacity Blind Steganographic Technique”, Intenational
Conference on Emerging Trendsin Science, Engineeringand
Technology , pp.192-197, July 2012.
[15] Lee ; Chen, and L.H., “High capacity image
Steganographic model”, Visual Image Signal Processing,
147:03,June 2008
[16] Nagaraj V., Dr. Vijayalakshmi V. and Dr. Zayaraz G.,
“Modulo based Image Steganography Technique against
Statistical and Histogram Analysis”, IJCGA Special Issue
on“Network Security and Cryptography” NSC, 2011.

More Related Content

What's hot

Reversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement ApproachReversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement Approach
CSCJournals
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
IAEME Publication
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 

What's hot (18)

FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...
FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...
FPGA IMPLEMENTATION OF HIGH SPEED BAUGH-WOOLEY MULTIPLIER USING DECOMPOSITION...
 
Histogram-based multilayer reversible data hiding method for securing secret ...
Histogram-based multilayer reversible data hiding method for securing secret ...Histogram-based multilayer reversible data hiding method for securing secret ...
Histogram-based multilayer reversible data hiding method for securing secret ...
 
An efficient hardware logarithm generator with modified quasi-symmetrical app...
An efficient hardware logarithm generator with modified quasi-symmetrical app...An efficient hardware logarithm generator with modified quasi-symmetrical app...
An efficient hardware logarithm generator with modified quasi-symmetrical app...
 
Lj3420632068
Lj3420632068Lj3420632068
Lj3420632068
 
Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...
 
Reversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancementReversible image data hiding with contrast enhancement
Reversible image data hiding with contrast enhancement
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
IRJET- An Acute Method of Encryption & Decryption by using Histograms and Che...
 
Reversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement ApproachReversible Data Hiding Using Contrast Enhancement Approach
Reversible Data Hiding Using Contrast Enhancement Approach
 
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual PredictionEfficient Reversible Data Hiding Algorithms Based on Dual Prediction
Efficient Reversible Data Hiding Algorithms Based on Dual Prediction
 
IRJET- Finding Dominant Color in the Artistic Painting using Data Mining ...
IRJET-  	  Finding Dominant Color in the Artistic Painting using Data Mining ...IRJET-  	  Finding Dominant Color in the Artistic Painting using Data Mining ...
IRJET- Finding Dominant Color in the Artistic Painting using Data Mining ...
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
 
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLIMETHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
METHOD FOR A SIMPLE ENCRYPTION OF IMAGES BASED ON THE CHAOTIC MAP OF BERNOULLI
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
 
Parallel KNN for Big Data using Adaptive Indexing
Parallel KNN for Big Data using Adaptive IndexingParallel KNN for Big Data using Adaptive Indexing
Parallel KNN for Big Data using Adaptive Indexing
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 

Similar to IRJET- An Improved 2LSB Steganography Technique for Data Transmission

Similar to IRJET- An Improved 2LSB Steganography Technique for Data Transmission (20)

Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...A Robust Image Watermarking Technique using Luminance Based Area Selection an...
A Robust Image Watermarking Technique using Luminance Based Area Selection an...
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social MediaIRJET- Encryption based Approach to Find Fake Uploaders in Social Media
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
Hybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image SteganographyHybrid DCT-DWT Digital Image Steganography
Hybrid DCT-DWT Digital Image Steganography
 
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET-  	  Crop Pest Detection and Classification by K-Means and EM ClusteringIRJET-  	  Crop Pest Detection and Classification by K-Means and EM Clustering
IRJET- Crop Pest Detection and Classification by K-Means and EM Clustering
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
Comparative Analysis of Lossless Image Compression Based On Row By Row Classi...
 
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...IRJET-  	  Reversible Data Hiding in Video Frames based on Matched Neighbour ...
IRJET- Reversible Data Hiding in Video Frames based on Matched Neighbour ...
 
IRJET - mage Colorization using Self Attention GAN
IRJET - mage Colorization using Self Attention GANIRJET - mage Colorization using Self Attention GAN
IRJET - mage Colorization using Self Attention GAN
 
High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...High capacity histogram shifting based reversible data hiding with data compr...
High capacity histogram shifting based reversible data hiding with data compr...
 
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
IRJET- Implementation of Histogram based Tsallis Entropic Thresholding Segmen...
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVDIRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
IRJET- Contrast Enhancement of Grey Level and Color Image using DWT and SVD
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 

Recently uploaded (20)

History of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & ModernizationHistory of Indian Railways - the story of Growth & Modernization
History of Indian Railways - the story of Growth & Modernization
 
UNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptxUNIT 4 PTRP final Convergence in probability.pptx
UNIT 4 PTRP final Convergence in probability.pptx
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Passive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.pptPassive Air Cooling System and Solar Water Heater.ppt
Passive Air Cooling System and Solar Water Heater.ppt
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Diploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdfDiploma Engineering Drawing Qp-2024 Ece .pdf
Diploma Engineering Drawing Qp-2024 Ece .pdf
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
NO1 Best Powerful Vashikaran Specialist Baba Vashikaran Specialist For Love V...
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
The Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptxThe Entity-Relationship Model(ER Diagram).pptx
The Entity-Relationship Model(ER Diagram).pptx
 
CLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference ModalCLOUD COMPUTING SERVICES - Cloud Reference Modal
CLOUD COMPUTING SERVICES - Cloud Reference Modal
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
Interfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdfInterfacing Analog to Digital Data Converters ee3404.pdf
Interfacing Analog to Digital Data Converters ee3404.pdf
 

IRJET- An Improved 2LSB Steganography Technique for Data Transmission

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2749 An Improved 2LSB Steganography Technique for Data Transmission Mr. Dipak U. Chaudhari1, Dr. Sahebrao B. Bagal2 1M.E. (E & Tc), Late G.N. Sapkal, College of Engineering, Nashik, Maharashtra, India 2Principal and Guide, Late G.N. Sapkal, College of Engineering, Nashik, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In this paper message bits are embedded randomly to achieve the higher security by combining cryptography and steganography. Cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties. 2LSB technique is used to improve data capacity in an image. Steganography means the study of invisible communication.InSteganography usually hide the existence of the communicated data in such a way that it remains confidential & it maintains secrecy between two communicating parties. This paper investigates how the parity of data can be used effectively to hide a secret message randomly in the image. Key Words: Cryptography, Steganography, MSE,PSNR,Two LSB, Random insertion. 1. INTRODUCTION In today’s computer world, it is very important to keep secret information secret, private information private, and when profits are involved, protect the copyrights of data. To accomplish these difficult tasks, new methods based on the principle of steganography is being developed and used. Many times, a cryptographic message transition gives unwanted attention. The cryptographic concept may be restricted for use. Steganography is the combination of art and science of communicating in a way which hides the existence of the communication. Cryptography hides the content of a private message from a unwanted people, whereas steganography even conceals the real message. Steganography is commonly different than cryptography or watermarking [3]. The relation between them is related in many ways, the fundamental difference between them in the way they are defined and application of them for the differentproblemsto which they are applied. Steganography is different than cryptography & must not be confused between both, where we transform the message so as to make it meaning obscure to unwanted people who intercept it. So, the definition of breaking the system is different [1]. This technique is based on RGB images. The two least significant bits of the red channel will be used as an indication to the existence of hidden data in green and blue channels. Before embedding the data bits, the parity of the data has been checked [5]. Then according to the content of red component data is placed into the pixel. The selection of pixels to embed was crucial since two controlling elements are used for modification of pixel. The technique used random insertion of bits; every pixel doesn’t carry the message bits, so it is difficult to detect presence of information in the pixel. In cryptography, the structure of a message is jumbled to make it meaningless and unintelligible unless the decryption key is detected. In other word, steganography prevents an unwanted recipient from suspecting that the data exist. A steganographic system thus embeds hidden content in unexceptional cover media so as not to produce an eavesdropper’ssuspicion. [1] Asan example, itispossible to embed a text inside an image or an audio file. 2. PROPOSED SCHEME The system is broken in cryptography when the hacker can read the secrete message. To break a steganographicsystem attacker have to detect that steganography has been used and he is detect to read the embedded message. RGB image consist of 3 colors red, green & blue. Image component is given by equation (1). Here R(x, y) is used as a controlling element & pair of data bits is embedded into G(x, y) &B(x,y). For any sequence of message bit pairs (m1, m2) (m3, m4). .. .. (m i-1,mi) ,we will compare the message bits with current G(x, y) and B(x, y) and by using table 2 and 3 data bits will get added into pixels. Whether to embed odd or even parity data is decided by performing modulus operation on R(x, y) which is obtained by equation (2). F(x, y) =R(x, y) + G(x, y)+ B(x, y) …(1) (R(x, y) + 2) mod (4) = 0 …(2) If equation (2) satisfies the condition, difference between message bit pairs & two least significant bits of G(x, y) is calculated using equation (3). If OE is less than ±2, even parity data is embedded into G(x, y). OE=G (b1, b0)-(mi-1, mi) …(3) Where, b0 and b1 are two least significant bitsof pixel.Same technique is used for embedding in B(x, y). OE decides whether to embed or not. If equation (2) doesnot satisfy the condition, then pair of odd data bitsis embedded. OE is used
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2750 to control embedding data rate. The OE variable affects probability of embedding payload. For maximum efficiency, value of OE must be in between -1 to +1. The following steps are used to embed data in pixels: Table -1: Embedding scheme 2 LSBs of Red 2 LSBs of Green 2 LSBs of Blue 00 Add even parity data Add even parity data 01 Add odd parity data Add odd parity data 10 Add even parity data Add even parity data 11 Add odd parity data Add odd parity data Table 1 shows the embedding scheme for message bits if two least significant bits of red color is divisible by 2 then and only then embed the even parity bits of the message Otherwise place the odd parity bits in to the green color and blue color component of that particular pixel. According to the following steps, If data bits are 00 then, G(x, y) for g00, g10, g11 G(x, y)= …(4) G(x, y) - 1 for g01 If data bits are 11then G(x, y ) for g00,g01,g11 G(x, y)= …(5) G(x, y ) + 1 for g10 For R(x, y) , mod( 2 ) ! = 0 …(6) If data bits are 01 then G(x, y ) for g01,g11 G(x, y ) = G(x, y) -1 for g10 …(7) G(x, y ) + 1 for g00 If data bits are 10 then G(x, y ) for g10,g00 G(x, y ) = G(x, y ) - 1 for g11 …(8) G(x, y ) + 1 for g01 Equation (4), (5), (7) and (8) are used to embed the message bits in to green color. Same equations can be used to embedding in blue color. We have placed the message bitsin B(x, y) after performing the operations on G(x, y). If the contents of R=00, OR 10 and at the same time data bit s are 00 or 1 Table -2: Embedding scheme when R = 00 OR 10 d00 d11 For G=00 G=G DON’T ADD For G=01 G=G-1 DON’T ADD For G=10 DON’T ADD G=G+1 For G=11 DON’T ADD G=G If the contentsof R=01 OR 11 and at the same time data bits are 00 or 10 Table -3: Embedding scheme when R = 01 OR 11 d01 d10 For G=00 G=G + 1 DON’T ADD For G=01 G=G G=G+1 For G=10 G=G -1 G=G For G=11 DON’T ADD G=G – 1
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2751 If equation (6) satisfies the condition & data bits are having even parity. Then equation (9) can be used to embed the data. In this case pixel value will be changed without embedding data bits. This is undesired operation which helps to degrade the image. But embedding capacity is increases. Since some of the pixel doesn’t carry any information, it is difficult to detect the pixelwhichcarriesthe information. When contents of R are 00 or 11 then add the message bits without checking any condition. It has been observed that if we use parity check for R= 00 or 11, around 35 to 40% pixels get wasted, which doesn’t carry the message bits. Our aim is to provide higher security with higher embedding rate. 3. EXPERIMENTAL RESULTS First, different images of same size have been taken for inserting the same message. And then different messages of same size have been taken to insert in one image. Some experiments are also performed on different size of images and different size of messages. All pixels will not participate in embedding of message, as embedding of data is depends on the parity of message bits; the algorithm is tested by two ways. Experimental result shows that 65 to 74 percent of pixels contained data. For embedding data bitsin to image OE must be lessthan ±2, it is observed that equation (2) limits the embedding rate. This is because of random insertion. These Images are taken from www.google.com. Image 1 Image 2 Image 3 Image 4 Fig -1: Cover images Image 1 Image 2 Image 3 Image 4 Fig -2: Stego images 3. CALCULATION OF PSNR In order to avoid the stego-image from being suspected of hiding secret information in, the quality of the stego-image should not be degraded significantly. The mean squared error between the cover image and the stego-image (embedding distortion) can be used as one of the measures to assess the relative perceptibility of the embedded text. [3][6]. Usually, the PSNR (Peak Signal-to-Noise Ratio) formula is used to evaluate the distortion between the pre- processing image and the post-processing image. PSNR = 10 log 10[ ( 2 n – 1 ) / MSE] The x and y stand for image’sheight and width, respectively. The Xij and Xiij represent the preprocessing image pixel value in position (i, j) and the post-processing image pixel value in position (i, j), respectively. Theoretically, if the distortion between the preprocessing image and the post processing image is small, the value of PSNR comes out larger. Therefore, a larger value of PSNR means that the processed image has better quality. Usually, if the PSNR value is greater than or equal to 30 db, the distortion between the original image and the processed image is not suspiciousto the human eye the experiment isperformedon different images to calculate PSNR. The figure 1 shows the cover images and figure 2 shows the respective stego images. Cover images are taken from google.com. Table 4 illustrates the PSNR values and mean square error. MSE = 1 X x Y ∑ ∑ X I J – X I J I J X Y 2
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 06 | June-2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 2752 Table -3: PSNR Values of the images Image MSE PSNR Image 1 0.7216 39.2678 Image 2 0.8814 36.4343 Image 3 0.7346 37.5528 Image 4 0.7118 42.7283 4. CONCLUSION In the project, the two least significant bits of pixel will used to embed the data bits therefore the capacity of the algorithm will be better. Encryption and steganography can achieve separate goals. Encryption encodesdata suchthatan unintended recipient cannot determine its intended meaning. Since Two LSB’s are used for embedding. Present method is having high embedding rate. The capacity of the algorithm is better. Experimental result shows that PSNR ratios of images are founds to be more than 30dB. Thus processed images are not suspiciousto the humaneye,along with this advantage the random insertion method is used. And thus the transmission of data is highly secured. REFERENCES [1] Ishwarjot Singh ,J.P Raina,“ Advance Scheme for Secret Data Hiding System using Hop feld & LSB” International Journal of Computer Trendsand Technology(IJCT)–volume 4 Issue 7–July 2013. [2] G. Manikandan, M. Kamarasan and N. Sairam “A Hybrid Approach for Security Enhancement by CompressedCrypto- Stegno Scheme “, Research Journal of Applied Sciences, Engineering and Technology 4(6): 608-614, 2012 [3] Dumitrescu, S. W. Xiaolin and Z. Wang,2003.Detectionof LSB steganography via sample pair analysis. In: LNCS, Vol. 2578, Springer-Verlag, New York, pp: 355 -372. [4] J. Kaur and Sanjeev Kumar, ” Study and Analysis of Various Image Steganography Techniques”IJSTVol.2Issue3, September 2011 . [5] Adnan Gutub, Abdulaziz Tabakh,AyedAl-Qahtani“Triple- A: Secure RGB Image Steganography Based on Randomzation”, International Confernce on Computer Systems and Applicatons (AICCSA-2009),pp:400-403,10-13 May 2009. [6] Sharp T., “An implementation of key-based digital signal Steganography” in Pro. Information Hiding Workshop,Springer LNCS 2137, pp. 13–26, 2001. [7] Jarno Mielikainen, "LSB Matching Revisited", Signal Processing Letters, IEEE, Publication : May 2006 Volume : 13, Issue : 5, pp. 285- 287. [8] Bailey, K., and Curran, K., “An Evaluation of Image Based Steganography Methods”, Journal of Multimedia Tools and Applications, Vol. 30, No. 1, pp. 55-88, 2006. [9] J. Mielikainen, "LSB Matching Revisited" Signal Processing Letters, IEEE, Publication : May 2006 Volume : 13, Issue : 5, pp. 285- 287. [10] Sanjeev Kumar & Jagvinder Kaur, ” Study and Analysis of Various Image Steganography Techniques” IJCST Vol.2, Issue 3, September 2011 [11] Ahn, L.V. and N.J. Hopper, 2004. Secret-key steganography. In Lecture Notes in Computer Science.Vol. 3027 /2005 of Advances in Cryptology - EUROCRYPT 2004, pp: 323–341. Springer-Verlag Heidelberg. [12] Liu, Fenlin, Yang, Chunfang., Luo, Xiangyang., and Zeng, Ying., “Pixel Group Trace Model-Based Quantitative Steganalysis for Multiple LSB Steganography”, IEEE Transactions on Information Forensics and Security, Vol. 8, No. 1, January 2013. [13] N.F Johnson and Jajodia, S., “Exploring Steganography:Seeing the Unseen”, Computer Journal, February 2008. [14] Shabir A. Parah, G.M. Bhat, Javaid A. Sheikh, “Data Hiding in Intermediate Significant Bit Planes, A High Capacity Blind Steganographic Technique”, Intenational Conference on Emerging Trendsin Science, Engineeringand Technology , pp.192-197, July 2012. [15] Lee ; Chen, and L.H., “High capacity image Steganographic model”, Visual Image Signal Processing, 147:03,June 2008 [16] Nagaraj V., Dr. Vijayalakshmi V. and Dr. Zayaraz G., “Modulo based Image Steganography Technique against Statistical and Histogram Analysis”, IJCGA Special Issue on“Network Security and Cryptography” NSC, 2011.