SlideShare a Scribd company logo
International Journal of Informatics and Communication Technology (IJ-ICT)
Vol.7, No.1, April 2018, pp. 1~7
ISSN: 2252-8776, DOI: 10.11591/ijict.v7i1.pp1-7  1
Journal homepage: http://iaescore.com/journals/index.php/IJICT
Digital Image Steganography Using Bit Flipping
Aditya Kumar Sahu*1
, Gandharba Swain2
1,2
Department of Computer Science & Engineering, K L University, Andhra Pradesh, India
1
Department of Computer Science & Engineering, GMRIT, Andhra Pradesh, India
Article Info ABSTRACT
Article history:
Received Jan 15 , 2018
Revised Feb 28, 2018
Accepted Mar 7, 2018
This article proposes bit flipping method to conceal secret data in the original
image. Here a section consists of 2 pixels and there by flipping one or two
LSBs of the pixels to hide secret information in it. It exists in 2 variants. The
variant-1 and variant-2 both use 7th
and 8th
bit to conceal the secret data.
Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a
pair of pixels. Our proposed method notably raises the capacity as well as bits
per pixel that can be hidden in the image compared to existing bit flipping
method. The image steganographic parameters such as, peak signal to noise
ratio (PSNR), hiding capacity, and the quality index of the proposed
techniques has been compared with the existing bit flipping technique.
Keyword:
Bit flipping
Capacity
Least significant bit (LSB)
Substitution
Steganography Copyright © 2018 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
Aditya Kumar Sahu,
Department of Computer Science & Engineering,
K L University,
Vaddeswaram 522502, Andhra Pradesh, India.
Email: adityasahu.cse@gmail.com
1. INTRODUCTION
Today information hiding became a dominant area in every aspect of life. The real threat to data is in
the field of digital data communication. The internet is the principal entity for carrying the digital data.
The security to the data is a matter of real interest. In this aspect, cryptography and steganography are the
prominent fields for achieving surveillance to secret data. Cryptography misleads the unapproved entity by
manipulating the original information [1-3]. Steganography, other side shields the data so that the unapproved
entity cannot even predict the survival of data. It comes in diverse ways such as implanting the data in the
image, video, audio etc. [4, 5]. Image steganography has gained the attention of many researchers during the
years. Implanting text data in the original or cover image is image steganography, the new image which carries
the information is resulting image [6].
The efficacy of any image steganographic method depends on various parameters. Parameters like
capacity, bits per pixel (BPP), peak signal to noise ratio (PSNR), Quality index (QI) determines the impression
of the method [2-4]. The amount of information a resulting image can hide is the capacity for the method.
The bits per pixel (bpp) is the measure of the number of secret data in bits that are concealed in the pixel of an
original image. The PSNR is a metric for finding the quality of a resulting image. The more the PSNR is the
better the method. Q.I tell about the closeness between the original image and resulting image.
Least significant- bit (LSB) is the familiar and simpler technique gives better capacity but the relative
reduction in the quality of resulting image, [6]. The use of Moderately-Significant bit (MSB) by pixel
adjustment process of the cover image for concealing information has been suggested by Wang et al. [7].
A genetic algorithm based on perceptual modeling with a combination of rightmost LSB in order to achieve
large capacity has been proposed by Wang et al. [8]. Although the capacity increases by using Wang et al. [8]
method but it the price of hike in the complexity. To avoid the scenario and to reduce the complexity Chan and
Cheng [9] suggested an optimal pixel adjustment process. The LSB bit is not altered straightforward by which
 ISSN: 2252-8776
IJ-ICT Vol. 7, No. 1, April 2018 : 1– 7
2
the error can be cut down drastically. The combination of cryptography and steganography can achieve a better
security for the data [10]. LSB methods is valuable for hiding the larger magnitude of data. But, Fridrich et al.
[11] found the weakness of LSB methods. In 2003, Wu and Tsai [12] suggested a unique method in the ground
of image steganography which is known as pixel value differencing (PVD). Here the difference between two
consecutive pixels is taken into account and a new difference value is found to concealing the secret data.
The amount of secret data will be hidden is depends upon the difference value between the consecutive pixel.
A larger difference value indicates a higher amount of secret data hidden in the image. The image can be
segregated into either smooth area or edge area. The edge areas can be utilized to hide more number of data
compared to smooth areas. A large variety of diversified techniques in combination with PVD and LSB has
been suggested in the literature [13-23]. Swain [24] given a method for inserting secret information by using
group of bits substitution (GBS). He suggested 1GBS and 2GBS techniques. The 1GBS technique hides 1 bit
and 2GBS hides 2 bits of secret data. A novel track in image steganography called LSB array has been
suggested in [25]. The above works have been further continued in [26].
2. EXISTING TECHNIQUE
Kumar and Chand [2] proposed a bit flipping method for concealing 1 bit of secret data in a pair of
pixel. A block of 2 pixels taken which hides single bit only. The last LSB bit has been exploited for concealing
the secret data at the first layer of embedding. In the existing work, the block of 2 pixels hides only 1 bit of
secret information. This motivates us for providing 2 variants of bit flipping which can conceal 2 and 3 bits of
secret data respectively in a segment or block of two pixels. The embedding and extraction process of the said
variants has been proposed below.
3. PROPOSED BIT FLIPPING TECHNIQUE
This technique divides the cover image into sections. Each section (S) consists of 2 pixels say, Sx
and Sx+1, for x=1 to N-1. Where ‘N’ is the total number of pixel elements of the image. The bit flipping
technique exists in two variants, (i) Bit flipping-1 and (ii) Bit flipping-2.
3.1 Bit Flipping-1:
In this, the 7th
and 8th
bits of the pixels are utilized for hiding the secret information. Each section (S)
hides 2 bit of secret data sequentially. The embedding and extraction procedures are outlined below.
3.1.1 Embedding Algorithm
Step-1: Change the data to be hidden into binary. The dimension of secret data is also changed to 18 bit.
This is placed at the top of the binary message. The message is now combination of both.
Step-2: Read the original image (Ix). Convert it to binary also read the last 2 bits i.e 7th
and 8th
bit to form the
location map from all the pixels of the original image Ix, x=1 to N, where each Ix is a pixel of 8-bit length.
Compress the location map and send it to the receiver.
Step-3: Read the secret data in binary. Divide the secret data into a block of three bits of length. So, the three
bits can range from 000 to 111.
Step-4: Let the block of secret data is ki where i = 1 to
𝑛
3
, where n is the length of secret message.
Step-5: For each section (S) of the original image (Ix), let Sx and Sx+1 be the two consecutive pixels of the
section. For each section (S) of original image (I),
If ki= 000, No change to any pixel of the section.
Else if ki = 001, Flip the 8th
LSB bit of Sxonly.
Else if ki = 010, Flip the 7th
LSB bit of Sxonly.
Else if ki = 011, Flip the 8th
LSB bit of Sx+1 only.
Else if ki = 100, Flip the 7th
LSB bit of Sx+1only.
Else if ki = 101, Flip the 7th
, 8th
LSB bit of Sxonly.
Else if ki = 110, Flip the 7th
, 8th
LSB bit of Sx+1only.
Else if ki = 111, Flip the 7th
, 8th
LSB bit of both the section.
Step-6: Transmit the obtained resulting image (G) along with the compressed location map to the receiver.
The embedding process is successful.
3.1.2 Extraction Algorithm
The extraction algorithm is opposite of embedding. The various steps for extracting the secret data
are as follows.
IJ-ICT ISSN: 2252-8776 
Digital Image Steganography Using Bit Flipping (Aditya Kumar Sahu)
3
Step-1: Decompress the compressed location map and find the 7th
and 8th
bit of original image. Initialize Mi to
empty and initialize the counter, count=1.
Step-2: For each section (S) of the resulting image (G) repeat step-3.
Step-3: Compare 7th
and 8th
bit of each section (S) of resulting image with the location map.
If 7th
and 8th
bit of both pixels Sx and Sx+1 are same as corresponding bits of location map then extract 000 and
concatenate to Mi.
Else if only 8th
LSB bit of Sx has changed then extract 001 and concatenate to Mi.
Else if only 7th
LSB bit of Sx has changed then extract 010 and concatenate to Mi.
Else if only 8th
LSB bit of Sx+1 has changed then extract 011 and concatenate to Mi.
Else if only 7th
LSB bit of Sx+1 has changed then extract 100 and concatenate to Mi.
Else if only 7th
, 8th
LSB bit of Sx has changed then extract 101 and concatenate to Mi.
Else if only 7th
, 8th
LSB bit of Sx, Sx+1 changed then extract 110 and concatenate to Mi.
If 7th
and 8th
bit of both pixels Sx and Sx+1 have changed then extract 111 and concatenate to Mi.
Step4: Set count=count+3. If count < 18 then go to step3, otherwise go to step5.
Step-5: Convert the 18 bits in Mi to decimal and then multiply by 7, which is the length of the embedded
message in bits, let it be n.
Step-6: Reinitialize Mi to blank, and for i= 1 to
𝑛−18
3
repeat step3. Then we get Mi with n-18 bits length.
Step-7: Convert the bits of Mi to characters. The extraction is successful.
3.2 Bit Flipping-2:
The7th
and 8th
bits of the original image (Ix) is used to hide the secret data. Each section (S) hides 4
bit of secret data sequentially. The embedding and extraction procedures are as follows.
3.2.1 Embedding Algorithm
Step-1: Change the data to be hidden into binary. The dimension of secret data is also changed to 18 bit.
This is placed at the top of the binary message. The message is now combination of both.
Step-2: Read the original image (Ix). Convert it to binary. Where, x=1 to N, where each Ix is a pixel of 8 bit
length. Read the last 2 bits that are 7th
and 8th
bit from all the pixels of the original image (Ix) and form the
location map. Compress the location map and send it to the receiver.
Step-3: Read the secret data in binary. Convert it into blocks of four bits in length. The four bits can range
from 0000 to 1111.
Step-4: Let the block of secret data is ki where i = 1 to
𝑛
4
, where n is the length of secret message.
Step-5: For each section (S) of original image (I), let Sxand Sx+1 be the two consecutive pixels of the sections.
If ki = 0000, No change to any pixel of the section.
Else if ki= 0001, Flip the 8th
LSB bit of Sx+1 only.
Else if ki= 0010, Flip the 7th
LSB bit of Sx+1 only.
Else if ki= 0011, Flip the7th
, 8th
LSB bit of Sx+1 only.
Else if ki= 0100, Flip the 8th
LSB bit of Sxonly.
Else if ki= 0101, Flip the 8th
LSB bits of both Sx and Sx+1 .
Else if ki= 0110, Flip the 8th
LSB bit of both Sx and 7th
LSB bit of Sx+1.
Else if ki= 0111, Flip the 8th
bit of Sx and 7th
& 8th
LSB bits of Sx.and Sx+1.
Else if ki= 1000, Flip the 7th
LSB bit of Sx only.
Else if ki= 1001, Flip the 7th
LSB bit of Sxand 8th
LSB bit of Sx+1.
Else if ki= 1010, Flip the 7th
LSB bits of both Sx and Sx+1.
Else if ki= 1011, Flip the 7th
LSB bit of Sxand both 7th
& 8th
LSB bits of Sx+1.
Else if ki= 1100, Flip the 7th
, 8th
LSB bit of Sx only.
Else if ki= 1101, Flip the 7th
, 8th
LSB bits of Sx and 8th
LSB of Sx+1.
Else if ki= 1110, Flip both the 7th
& 8th
LSB bits of Sx and 7th
LSB bit of Sx+1.
Else if ki= 1111, Flip the 7th
and 8th
LSB bits of Sxand Sx+1 .
Step-6: Transmit the obtained resulting image (G) along with the compressed location map to the receiver.
The embedding process is successful.
3.2.2 Extraction Algorithm
The extraction algorithm is opposite of embedding process. The various steps of retrieving the secret
data are outlined below.
Step-1: Decompress the compressed location map and find the 7th
and 8th
bits of the original image. Initialize
Mi to empty and initialize the counter, count=1.
Step-2: For each section (S) of the resulting image (G), repeat the step3.
 ISSN: 2252-8776
IJ-ICT Vol. 7, No. 1, April 2018 : 1– 7
4
Step-3: Compare each section (S) of resulting image with the location map.
If 7th
and 8th
bit of both pixels Sx and Sx+1 are same as corresponding bits of location map then extract 0000
and concatenate toMi.
Else if only 8th
LSB bit of Sx+1 has changed then extract 0001 and concatenate to Mi.
Else if only 7th
LSB bit of Sx+1 has changed then extract 0010 and concatenate to Mi.
Else if only 7th
, 8th
LSB bit of Sx+1 has changed then extract 0011 and concatenate to Mi.
Else if only 8th
LSB bit of Sxhas changed then extract 0100 and concatenate Mi.
Else if 8th
LSB bit of Sx, Sx+1 both have changed then extract 0101 and concatenate to Mi.
Else if 8th
LSB bit of Sx and 7th
LSB bit of Sx+1 both has changed then extract ki 0110 and concatenate to Mi.
Else if 8th
LSB bit of Sx and 7th
, 8th
LSB bit of Sx+1.both has changed then extract ki 0111 and
concatenate to Mi.
Else if only 7th
LSB bit of Sx has changed then extract 1000 and concatenate to Mi.
Else if 7th
LSB bit of Sx and 8th
LSB bit of Sx+1 has changed then extract 1001 and concatenate to Mi.
Else if 7th
LSB bit of Sx and Sx+1 both have changed then extract 1010 and concatenate to Mi.
Else if 7th
LSB bit of Sx and 7th
and 8th
LSB bit of Sx+1 both have changed then extract 1011 and
concatenate to Mi.
Else if 7th
, 8th
LSB bit LSB bit of Sx has changed then extract 1100 and concatenate to Mi.
Else if 7th
, 8th
LSB bit of Sxand 8th
LSB bit of Sx+1 both have changed then extract 1101 and concatenate to Mi.
Else if 7th
, 8th
LSB bit of Sxand 7th
LSB bit of Sx+1 both have changed then extract 1110 and concatenate toMi.
Else if 7th, 8th
LSB bit of Sxand Sx+1 both have changed then extract 1111 and concatenate toMi.
Step-4: Set count=count+4. If count ≤ 18 then go to step3, otherwise move to step5.
Step-5: Decimalize the 18 bits in Mi and multiply by 7, which is the magnitude of the total embedded message
in terms of bits, let it be n.
Step-6: Reinitialize ki to blank, and for i= 1 to
𝑛−18
4
repeat step-3. Then we get Mi with n-18 bits length.
Step-7: Convert the bits of Mi to characters. The extraction is successful.
4. RESULTS
The given method has been compared with the existing bit flipping method [2], in Table 1.
The parameters such as PSNR, hiding capacity, quality index (Q.I), and Bit rate (i.e. bits per pixel, BPP),
referred from [28, 29] has been considered for comparison. From Table 1, it is concluded that the capacity of
proposed bit flipping technique is more than that of existing technique. The capacity of Bit flipping-2 is 1.5
times larger compared to the existing method. The PSNR of the proposed techniques is acceptable i.e. more
than 40. If we compare among the three proposed techniques the bit flipping-2 is preferable for higher
hiding capacity.
The cover images are shown in Figure 1. (a)-(h) and the resulting images for bit flipping-1,
bit flipping-2 schemas respectively are shown in Figure 2. (a)- (h) and Figure 3. (a)- (h), with 2,45,000 bits of
data are concealed in each. It is a clear indication that the resulting images are indistinguishable and do not
show any identification areas.
(a) Lena (b) Baboon (c) Peppers (d) Boat
IJ-ICT ISSN: 2252-8776 
Digital Image Steganography Using Bit Flipping (Aditya Kumar Sahu)
5
(e) House (f) Baby (g) Barbara (h) Bird
Figure 1. (a)-(h) Original Images
(a) Lena (b) Baboon (c) Peppers (d) Boat
(e) House (f) Baby (g) Barbara (h) Bird
Figure 2. (a)-(h) Resulting Images of Bit Flipping-1
(a) Lena (b) Baboon (c) Peppers (d) Boat
 ISSN: 2252-8776
IJ-ICT Vol. 7, No. 1, April 2018 : 1– 7
6
(e) House (f) Baby (g) Barbara (h) Bird
Figure 3. (a)-(h) Resulting Images of Bit Flipping-2
Table 1. Results of Proposed Bit Flipping -1 and Bit Flipping-2 Schemes
Images
512×512
Existing Bit flipping technique [2] Proposed Bit flipping-1 technique Proposed Bit flipping-2 technique
PSNR Capacity Q.I BPP PSNR Capacity Q.I BPP PSNR Capacity Q.I BPP
Lena 51.27 262144 0.98 1 47.38 393216 0.97 1.5 47.31 524288 0.97 2.0
Baboon 51.27 262144 0.99 1 47.36 393216 0.99 1.5 47.33 524288 0.99 2.0
Peppers 51.28 262144 0.98 1 47.39 393216 0.97 1.5 47.32 524288 0.97 2.0
Boat 51.27 262144 0.99 1 47.20 393216 0.98 1.5 47.19 524288 0.98 2.0
House 51.28 262144 0.99 1 47.37 393216 0.98 1.5 47.30 524288 0.98 2.0
Baby 51.27 262144 0.97 1 47.36 393 16 0.94 1.5 47.31 524288 0.94 2.0
Barbara 51.27 262144 0.98 1 47.34 393216 0.96 1.5 47.30 524288 0.96 2.0
Bird 51.26 262144 0.89 1 47.80 393216 0.87 1.5 47.66 524288 0.88 2.0
Average 51.27 262144 0.97 1 47.40 393216 0.96 1.5 47.34 524288 0.96 2.0
5. CONCLUSION
This article proposes a modified bit flipping technique for hiding information in an image called as
bit flipping-1 and bit flipping-2. The proposed bit flipping-1 offers a capacity of 3 bits for a pair of pixels.
The bit flipping-2 offers a capacity of 4 bits for a pair of pixels. Thus the capacities of the proposed techniques
are improved. Furthermore, it is quite clear from the resulting images that it is not susceptible to the invader.
REFERENCES
[1] Johnson, N. F., Jajodia, S. “Exploring steganography: seeing the unseen”. IEEE Computer, 1998; 31(2): 26–34.
[2] Kumar, R., Chand, S. “A reversible data hiding scheme using bit flipping strategy”. Journal of Discrete Mathematical
Sciences and Cryptography, 2016; 19(2): 331-345.
[3] Pradhan, A., Sahu, A.K., Swain, G., & Sekhar, K.R. Performance evaluation parameters of image steganography
techniques. International Conference on Research Advances in Integrated Navigation Systems, 2016, DOI:
10.1109/RAINS.2016.7764399.
[4] Swain, G., Lenka, S. K. “Classification of Image Steganography Techniques in Spatial Domain : A Study”.
International Journal of Computer Science & Engineering Technology, 2014; 5(3): 219–232.
[5] Sahu, A. K., Swain, G. A. “Review on LSB substitution and PVD based image steganography techniques”. Indonesian
Journal of Electrical Engineering and Computer Science, 2016; 2(3): 712-719.
[6] Sahu, A. K, Sahu M. “Digital image steganography techniques in spatial domain: a study”, International Journal of
Pharmacy & Technology, 2016; 8(4): 5205- 5217.
[7] Wang, R., Lin, C., Lin, J. “Hiding data in images by optimal moderately-significant-bit replacement”. Electronics
Letters, 2000; 36(25): 2069–2070.
[8] Wang, R. Z., Lin, C. F., Lin, J. C. “Image hiding by optimal LSB substitution and genetic algorithm”. Pattern
Recognition, 2001; 34(3): 671–683.
[9] Chan, C. K., Cheng, L. M. “Hiding data in images by simple LSB substitution”. Pattern Recognition, 2004; 37(3):
469–474.
[10] Swain, G., Lenka, S. K. “A technique for secret communication using a new block cipher with dynamic
steganography”. International Journal of Security and Its Applications, 2012; 6(4): 13–24.
[11] Fridrich, J., Goljan, M., Du, R. “Reliable detection of LSB steganography in grayscale and color images”. ACM
Workshop on Multimedia and Security, 2001, 27–30. http://doi.org/10.1145/1232454.1232466.
[12] Wu, D. C., Tsai, W. H. “A steganographic method for images by pixel-value differencing”. Pattern Recognition
Letters, 2003; 24(9–10): 1613–1626.
[13] Yang, C. H., Weng, C. Y., Wang, S. J., Sun, H. M. “Adaptive data hiding in edge areas of images with spatial LSB
domain systems”. IEEE Transactions on Information Forensics and Security, 2008; 3(3): 488–497.
[14] Wu, H.C., Wu, N.I. Tsai, C.S., Hwang, M.S. “An image steganographic scheme based on pixel-value differencing and
LSB replacement methods”. IEE Proceedings- Vision Image Signal Processing, 2005; 152(5): 611–615.
IJ-ICT ISSN: 2252-8776 
Digital Image Steganography Using Bit Flipping (Aditya Kumar Sahu)
7
[15] Yang, C. H., Weng, C. Y., Wang, S. J., Sun, H. M. “Varied PVD + LSB evading detection programs to spatial domain
in data embedding systems”. Journal of Systems and Software, 2010; 83(10): 1635–1643.
[16] Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S. “A high quality steganographic method with pixel-value differencing
and modulus function”. The journal of system and software, 2008; 81: 150–158.
[17] Liao, X., Wen, Q. Y., Zhang, J. “A steganographic method for digital images with four-pixel differencing and modified
LSB substitution”. Journal of Visual Communication and Image Representation, 2011, 22(1), 1–8.
[18] Swain, G. “Digital image steganography using nine-pixel differencing and modified LSB substitution”. Indian Journal
of Science and Technology, 2014; 7(9): 1444–1450.
[19] Malik, A., Sikka, G., Verma, H. K. “A modified pixel-value differencing image steganographic scheme with least
significant bit substitution method”. International Journal of Image, Graphics and Signal Processing. 2015; 4:
68–74.
[20] Pradhan, A., Sekhar K. R., Swain G. “Digital image steganography based on seven way pixel value differencing”.
Indian Journal of Science &Technology,2016,9(37),pp.1-11, doi: 10.17485/ijst/2016/v9i37/88557.
[21] Pradhan, A., Sekhar K. R., Swain G. Digital image steganography combining LSB substitution with five way PVD in
2×3 pixel blocks, International Journal of Pharmacy and Technology, 2016; 8(4): 22051-22061
[22] Swain G. “A steganographic method combining LSB substitution and PVD in a block”. Procedia Computer
Science, 2016; 85: 39-44.
[23] Swain G. “Adaptive pixel value differencing steganography using both vertical and horizontal edges”. Multimedia
Tools and Applications, 2016; 75(21): 13541-13556
[24] Swain, G. “Digital image steganography using variable length group of bits substitution”. Procedia Computer Science,
2016; 85: 31–38.
[25] Juneja, M., Sandhu, P. S. “Designing of robust image steganography technique based on LSB insertion and
encryption”. International Conference on Advances in Recent Technologies in Communication and Computing, 2009:
302–305.
[26] Swain, G., Lenka, S. K. “LSB array based image steganography technique by exploring the four least significant bits”.
Global Trends in Information Systems and Software Applications. 2012. CCIS, 479-488.
[27] Swain, G., Lenka, S. K. “A novel steganography technique by mapping words with LSB array”. International Journal
of Signal and Imaging Systems Engineering, 2015; 8(1): 115–122.
[28] Wang, Z., Bovik, A. “A universal image quality index”. IEEE Signal Processing Letters, 2002; 9(3): 81–84.
[29] Sahu, A.K., Swain, G. “Information Hiding Using Group of Bits Substitution”. International Journal on
Communication Antenna and Propagation.2017. https://doi.org/10.15866/irecap.v7i2.11675.

More Related Content

What's hot

Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...
ijcsit
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
ANUP PALARAPWAR
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
ijait
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
eSAT Publishing House
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
cscpconf
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
eSAT Journals
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
eSAT Publishing House
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
IJERA Editor
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2
IAEME Publication
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
eSAT Publishing House
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
AM Publications,India
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
IJNSA Journal
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation
IJEEE
 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
Ali Broumandnia
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
IJNSA Journal
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
ZiadAlqady
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
IOSR Journals
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
IJARIIT
 

What's hot (18)

Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...Experimental analysis of matching technique of steganography for greyscale an...
Experimental analysis of matching technique of steganography for greyscale an...
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Secured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptographySecured data hiding by using extended visual cryptography
Secured data hiding by using extended visual cryptography
 
Secured data hiding by using extended visual
Secured data hiding by using extended visualSecured data hiding by using extended visual
Secured data hiding by using extended visual
 
An LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic TechniquesAn LSB Method Of Image Steganographic Techniques
An LSB Method Of Image Steganographic Techniques
 
Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2Steganography based on random pixel selection for efficient data hiding 2
Steganography based on random pixel selection for efficient data hiding 2
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 
Frequency Domain Approach of Image Steganography
Frequency Domain Approach of Image SteganographyFrequency Domain Approach of Image Steganography
Frequency Domain Approach of Image Steganography
 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation
 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
 
Analysis of color image noising process
Analysis of color image noising processAnalysis of color image noising process
Analysis of color image noising process
 
The Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid CryptographyThe Comparative Study on Visual Cryptography and Random Grid Cryptography
The Comparative Study on Visual Cryptography and Random Grid Cryptography
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 

Similar to 1. updated document ed sat

Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
ijistjournal
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
Rashmi Tank
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
editor1knowledgecuddle
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
ijsrd.com
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
Jishnu Grandhi
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Budi Prasetiyo
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
IRJET Journal
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ZiadAlqady
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
IRJET Journal
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ijctet
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
IOSR Journals
 

Similar to 1. updated document ed sat (20)

Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 
A New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and DecryptionA New Algorithm for Digital Colour Image Encryption and Decryption
A New Algorithm for Digital Colour Image Encryption and Decryption
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 

More from IAESIJEECS

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
IAESIJEECS
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
IAESIJEECS
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
IAESIJEECS
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
IAESIJEECS
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...
IAESIJEECS
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-
IAESIJEECS
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...
IAESIJEECS
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...
IAESIJEECS
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on application
IAESIJEECS
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
IAESIJEECS
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
IAESIJEECS
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reduction
IAESIJEECS
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power loss
IAESIJEECS
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reduction
IAESIJEECS
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural network
IAESIJEECS
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
IAESIJEECS
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijict
IAESIJEECS
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijict
IAESIJEECS
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijict
IAESIJEECS
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijict
IAESIJEECS
 

More from IAESIJEECS (20)

08 20314 electronic doorbell...
08 20314 electronic doorbell...08 20314 electronic doorbell...
08 20314 electronic doorbell...
 
07 20278 augmented reality...
07 20278 augmented reality...07 20278 augmented reality...
07 20278 augmented reality...
 
06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...06 17443 an neuro fuzzy...
06 17443 an neuro fuzzy...
 
05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
 
04 20268 power loss reduction ...
04 20268 power loss reduction ...04 20268 power loss reduction ...
04 20268 power loss reduction ...
 
03 20237 arduino based gas-
03 20237 arduino based gas-03 20237 arduino based gas-
03 20237 arduino based gas-
 
02 20274 improved ichi square...
02 20274 improved ichi square...02 20274 improved ichi square...
02 20274 improved ichi square...
 
01 20264 diminution of real power...
01 20264 diminution of real power...01 20264 diminution of real power...
01 20264 diminution of real power...
 
08 20272 academic insight on application
08 20272 academic insight on application08 20272 academic insight on application
08 20272 academic insight on application
 
07 20252 cloud computing survey
07 20252 cloud computing survey07 20252 cloud computing survey
07 20252 cloud computing survey
 
06 20273 37746-1-ed
06 20273 37746-1-ed06 20273 37746-1-ed
06 20273 37746-1-ed
 
05 20261 real power loss reduction
05 20261 real power loss reduction05 20261 real power loss reduction
05 20261 real power loss reduction
 
04 20259 real power loss
04 20259 real power loss04 20259 real power loss
04 20259 real power loss
 
03 20270 true power loss reduction
03 20270 true power loss reduction03 20270 true power loss reduction
03 20270 true power loss reduction
 
02 15034 neural network
02 15034 neural network02 15034 neural network
02 15034 neural network
 
01 8445 speech enhancement
01 8445 speech enhancement01 8445 speech enhancement
01 8445 speech enhancement
 
08 17079 ijict
08 17079 ijict08 17079 ijict
08 17079 ijict
 
07 20269 ijict
07 20269 ijict07 20269 ijict
07 20269 ijict
 
06 10154 ijict
06 10154 ijict06 10154 ijict
06 10154 ijict
 
05 20255 ijict
05 20255 ijict05 20255 ijict
05 20255 ijict
 

Recently uploaded

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
DianaGray10
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
zjhamm304
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
HarpalGohil4
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
Tobias Schneck
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
Ajin Abraham
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
Sease
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
christinelarrosa
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Ukraine
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
Fwdays
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
Fwdays
 

Recently uploaded (20)

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
What is an RPA CoE? Session 2 – CoE Roles
What is an RPA CoE?  Session 2 – CoE RolesWhat is an RPA CoE?  Session 2 – CoE Roles
What is an RPA CoE? Session 2 – CoE Roles
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...QA or the Highway - Component Testing: Bridging the gap between frontend appl...
QA or the Highway - Component Testing: Bridging the gap between frontend appl...
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 
AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)AWS Certified Solutions Architect Associate (SAA-C03)
AWS Certified Solutions Architect Associate (SAA-C03)
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!Containers & AI - Beauty and the Beast!?!
Containers & AI - Beauty and the Beast!?!
 
AppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSFAppSec PNW: Android and iOS Application Security with MobSF
AppSec PNW: Android and iOS Application Security with MobSF
 
From Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMsFrom Natural Language to Structured Solr Queries using LLMs
From Natural Language to Structured Solr Queries using LLMs
 
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptxPRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
PRODUCT LISTING OPTIMIZATION PRESENTATION.pptx
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
GlobalLogic Java Community Webinar #18 “How to Improve Web Application Perfor...
 
"What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w..."What does it really mean for your system to be available, or how to define w...
"What does it really mean for your system to be available, or how to define w...
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba"NATO Hackathon Winner: AI-Powered Drug Search",  Taras Kloba
"NATO Hackathon Winner: AI-Powered Drug Search", Taras Kloba
 

1. updated document ed sat

  • 1. International Journal of Informatics and Communication Technology (IJ-ICT) Vol.7, No.1, April 2018, pp. 1~7 ISSN: 2252-8776, DOI: 10.11591/ijict.v7i1.pp1-7  1 Journal homepage: http://iaescore.com/journals/index.php/IJICT Digital Image Steganography Using Bit Flipping Aditya Kumar Sahu*1 , Gandharba Swain2 1,2 Department of Computer Science & Engineering, K L University, Andhra Pradesh, India 1 Department of Computer Science & Engineering, GMRIT, Andhra Pradesh, India Article Info ABSTRACT Article history: Received Jan 15 , 2018 Revised Feb 28, 2018 Accepted Mar 7, 2018 This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique. Keyword: Bit flipping Capacity Least significant bit (LSB) Substitution Steganography Copyright © 2018 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: Aditya Kumar Sahu, Department of Computer Science & Engineering, K L University, Vaddeswaram 522502, Andhra Pradesh, India. Email: adityasahu.cse@gmail.com 1. INTRODUCTION Today information hiding became a dominant area in every aspect of life. The real threat to data is in the field of digital data communication. The internet is the principal entity for carrying the digital data. The security to the data is a matter of real interest. In this aspect, cryptography and steganography are the prominent fields for achieving surveillance to secret data. Cryptography misleads the unapproved entity by manipulating the original information [1-3]. Steganography, other side shields the data so that the unapproved entity cannot even predict the survival of data. It comes in diverse ways such as implanting the data in the image, video, audio etc. [4, 5]. Image steganography has gained the attention of many researchers during the years. Implanting text data in the original or cover image is image steganography, the new image which carries the information is resulting image [6]. The efficacy of any image steganographic method depends on various parameters. Parameters like capacity, bits per pixel (BPP), peak signal to noise ratio (PSNR), Quality index (QI) determines the impression of the method [2-4]. The amount of information a resulting image can hide is the capacity for the method. The bits per pixel (bpp) is the measure of the number of secret data in bits that are concealed in the pixel of an original image. The PSNR is a metric for finding the quality of a resulting image. The more the PSNR is the better the method. Q.I tell about the closeness between the original image and resulting image. Least significant- bit (LSB) is the familiar and simpler technique gives better capacity but the relative reduction in the quality of resulting image, [6]. The use of Moderately-Significant bit (MSB) by pixel adjustment process of the cover image for concealing information has been suggested by Wang et al. [7]. A genetic algorithm based on perceptual modeling with a combination of rightmost LSB in order to achieve large capacity has been proposed by Wang et al. [8]. Although the capacity increases by using Wang et al. [8] method but it the price of hike in the complexity. To avoid the scenario and to reduce the complexity Chan and Cheng [9] suggested an optimal pixel adjustment process. The LSB bit is not altered straightforward by which
  • 2.  ISSN: 2252-8776 IJ-ICT Vol. 7, No. 1, April 2018 : 1– 7 2 the error can be cut down drastically. The combination of cryptography and steganography can achieve a better security for the data [10]. LSB methods is valuable for hiding the larger magnitude of data. But, Fridrich et al. [11] found the weakness of LSB methods. In 2003, Wu and Tsai [12] suggested a unique method in the ground of image steganography which is known as pixel value differencing (PVD). Here the difference between two consecutive pixels is taken into account and a new difference value is found to concealing the secret data. The amount of secret data will be hidden is depends upon the difference value between the consecutive pixel. A larger difference value indicates a higher amount of secret data hidden in the image. The image can be segregated into either smooth area or edge area. The edge areas can be utilized to hide more number of data compared to smooth areas. A large variety of diversified techniques in combination with PVD and LSB has been suggested in the literature [13-23]. Swain [24] given a method for inserting secret information by using group of bits substitution (GBS). He suggested 1GBS and 2GBS techniques. The 1GBS technique hides 1 bit and 2GBS hides 2 bits of secret data. A novel track in image steganography called LSB array has been suggested in [25]. The above works have been further continued in [26]. 2. EXISTING TECHNIQUE Kumar and Chand [2] proposed a bit flipping method for concealing 1 bit of secret data in a pair of pixel. A block of 2 pixels taken which hides single bit only. The last LSB bit has been exploited for concealing the secret data at the first layer of embedding. In the existing work, the block of 2 pixels hides only 1 bit of secret information. This motivates us for providing 2 variants of bit flipping which can conceal 2 and 3 bits of secret data respectively in a segment or block of two pixels. The embedding and extraction process of the said variants has been proposed below. 3. PROPOSED BIT FLIPPING TECHNIQUE This technique divides the cover image into sections. Each section (S) consists of 2 pixels say, Sx and Sx+1, for x=1 to N-1. Where ‘N’ is the total number of pixel elements of the image. The bit flipping technique exists in two variants, (i) Bit flipping-1 and (ii) Bit flipping-2. 3.1 Bit Flipping-1: In this, the 7th and 8th bits of the pixels are utilized for hiding the secret information. Each section (S) hides 2 bit of secret data sequentially. The embedding and extraction procedures are outlined below. 3.1.1 Embedding Algorithm Step-1: Change the data to be hidden into binary. The dimension of secret data is also changed to 18 bit. This is placed at the top of the binary message. The message is now combination of both. Step-2: Read the original image (Ix). Convert it to binary also read the last 2 bits i.e 7th and 8th bit to form the location map from all the pixels of the original image Ix, x=1 to N, where each Ix is a pixel of 8-bit length. Compress the location map and send it to the receiver. Step-3: Read the secret data in binary. Divide the secret data into a block of three bits of length. So, the three bits can range from 000 to 111. Step-4: Let the block of secret data is ki where i = 1 to 𝑛 3 , where n is the length of secret message. Step-5: For each section (S) of the original image (Ix), let Sx and Sx+1 be the two consecutive pixels of the section. For each section (S) of original image (I), If ki= 000, No change to any pixel of the section. Else if ki = 001, Flip the 8th LSB bit of Sxonly. Else if ki = 010, Flip the 7th LSB bit of Sxonly. Else if ki = 011, Flip the 8th LSB bit of Sx+1 only. Else if ki = 100, Flip the 7th LSB bit of Sx+1only. Else if ki = 101, Flip the 7th , 8th LSB bit of Sxonly. Else if ki = 110, Flip the 7th , 8th LSB bit of Sx+1only. Else if ki = 111, Flip the 7th , 8th LSB bit of both the section. Step-6: Transmit the obtained resulting image (G) along with the compressed location map to the receiver. The embedding process is successful. 3.1.2 Extraction Algorithm The extraction algorithm is opposite of embedding. The various steps for extracting the secret data are as follows.
  • 3. IJ-ICT ISSN: 2252-8776  Digital Image Steganography Using Bit Flipping (Aditya Kumar Sahu) 3 Step-1: Decompress the compressed location map and find the 7th and 8th bit of original image. Initialize Mi to empty and initialize the counter, count=1. Step-2: For each section (S) of the resulting image (G) repeat step-3. Step-3: Compare 7th and 8th bit of each section (S) of resulting image with the location map. If 7th and 8th bit of both pixels Sx and Sx+1 are same as corresponding bits of location map then extract 000 and concatenate to Mi. Else if only 8th LSB bit of Sx has changed then extract 001 and concatenate to Mi. Else if only 7th LSB bit of Sx has changed then extract 010 and concatenate to Mi. Else if only 8th LSB bit of Sx+1 has changed then extract 011 and concatenate to Mi. Else if only 7th LSB bit of Sx+1 has changed then extract 100 and concatenate to Mi. Else if only 7th , 8th LSB bit of Sx has changed then extract 101 and concatenate to Mi. Else if only 7th , 8th LSB bit of Sx, Sx+1 changed then extract 110 and concatenate to Mi. If 7th and 8th bit of both pixels Sx and Sx+1 have changed then extract 111 and concatenate to Mi. Step4: Set count=count+3. If count < 18 then go to step3, otherwise go to step5. Step-5: Convert the 18 bits in Mi to decimal and then multiply by 7, which is the length of the embedded message in bits, let it be n. Step-6: Reinitialize Mi to blank, and for i= 1 to 𝑛−18 3 repeat step3. Then we get Mi with n-18 bits length. Step-7: Convert the bits of Mi to characters. The extraction is successful. 3.2 Bit Flipping-2: The7th and 8th bits of the original image (Ix) is used to hide the secret data. Each section (S) hides 4 bit of secret data sequentially. The embedding and extraction procedures are as follows. 3.2.1 Embedding Algorithm Step-1: Change the data to be hidden into binary. The dimension of secret data is also changed to 18 bit. This is placed at the top of the binary message. The message is now combination of both. Step-2: Read the original image (Ix). Convert it to binary. Where, x=1 to N, where each Ix is a pixel of 8 bit length. Read the last 2 bits that are 7th and 8th bit from all the pixels of the original image (Ix) and form the location map. Compress the location map and send it to the receiver. Step-3: Read the secret data in binary. Convert it into blocks of four bits in length. The four bits can range from 0000 to 1111. Step-4: Let the block of secret data is ki where i = 1 to 𝑛 4 , where n is the length of secret message. Step-5: For each section (S) of original image (I), let Sxand Sx+1 be the two consecutive pixels of the sections. If ki = 0000, No change to any pixel of the section. Else if ki= 0001, Flip the 8th LSB bit of Sx+1 only. Else if ki= 0010, Flip the 7th LSB bit of Sx+1 only. Else if ki= 0011, Flip the7th , 8th LSB bit of Sx+1 only. Else if ki= 0100, Flip the 8th LSB bit of Sxonly. Else if ki= 0101, Flip the 8th LSB bits of both Sx and Sx+1 . Else if ki= 0110, Flip the 8th LSB bit of both Sx and 7th LSB bit of Sx+1. Else if ki= 0111, Flip the 8th bit of Sx and 7th & 8th LSB bits of Sx.and Sx+1. Else if ki= 1000, Flip the 7th LSB bit of Sx only. Else if ki= 1001, Flip the 7th LSB bit of Sxand 8th LSB bit of Sx+1. Else if ki= 1010, Flip the 7th LSB bits of both Sx and Sx+1. Else if ki= 1011, Flip the 7th LSB bit of Sxand both 7th & 8th LSB bits of Sx+1. Else if ki= 1100, Flip the 7th , 8th LSB bit of Sx only. Else if ki= 1101, Flip the 7th , 8th LSB bits of Sx and 8th LSB of Sx+1. Else if ki= 1110, Flip both the 7th & 8th LSB bits of Sx and 7th LSB bit of Sx+1. Else if ki= 1111, Flip the 7th and 8th LSB bits of Sxand Sx+1 . Step-6: Transmit the obtained resulting image (G) along with the compressed location map to the receiver. The embedding process is successful. 3.2.2 Extraction Algorithm The extraction algorithm is opposite of embedding process. The various steps of retrieving the secret data are outlined below. Step-1: Decompress the compressed location map and find the 7th and 8th bits of the original image. Initialize Mi to empty and initialize the counter, count=1. Step-2: For each section (S) of the resulting image (G), repeat the step3.
  • 4.  ISSN: 2252-8776 IJ-ICT Vol. 7, No. 1, April 2018 : 1– 7 4 Step-3: Compare each section (S) of resulting image with the location map. If 7th and 8th bit of both pixels Sx and Sx+1 are same as corresponding bits of location map then extract 0000 and concatenate toMi. Else if only 8th LSB bit of Sx+1 has changed then extract 0001 and concatenate to Mi. Else if only 7th LSB bit of Sx+1 has changed then extract 0010 and concatenate to Mi. Else if only 7th , 8th LSB bit of Sx+1 has changed then extract 0011 and concatenate to Mi. Else if only 8th LSB bit of Sxhas changed then extract 0100 and concatenate Mi. Else if 8th LSB bit of Sx, Sx+1 both have changed then extract 0101 and concatenate to Mi. Else if 8th LSB bit of Sx and 7th LSB bit of Sx+1 both has changed then extract ki 0110 and concatenate to Mi. Else if 8th LSB bit of Sx and 7th , 8th LSB bit of Sx+1.both has changed then extract ki 0111 and concatenate to Mi. Else if only 7th LSB bit of Sx has changed then extract 1000 and concatenate to Mi. Else if 7th LSB bit of Sx and 8th LSB bit of Sx+1 has changed then extract 1001 and concatenate to Mi. Else if 7th LSB bit of Sx and Sx+1 both have changed then extract 1010 and concatenate to Mi. Else if 7th LSB bit of Sx and 7th and 8th LSB bit of Sx+1 both have changed then extract 1011 and concatenate to Mi. Else if 7th , 8th LSB bit LSB bit of Sx has changed then extract 1100 and concatenate to Mi. Else if 7th , 8th LSB bit of Sxand 8th LSB bit of Sx+1 both have changed then extract 1101 and concatenate to Mi. Else if 7th , 8th LSB bit of Sxand 7th LSB bit of Sx+1 both have changed then extract 1110 and concatenate toMi. Else if 7th, 8th LSB bit of Sxand Sx+1 both have changed then extract 1111 and concatenate toMi. Step-4: Set count=count+4. If count ≤ 18 then go to step3, otherwise move to step5. Step-5: Decimalize the 18 bits in Mi and multiply by 7, which is the magnitude of the total embedded message in terms of bits, let it be n. Step-6: Reinitialize ki to blank, and for i= 1 to 𝑛−18 4 repeat step-3. Then we get Mi with n-18 bits length. Step-7: Convert the bits of Mi to characters. The extraction is successful. 4. RESULTS The given method has been compared with the existing bit flipping method [2], in Table 1. The parameters such as PSNR, hiding capacity, quality index (Q.I), and Bit rate (i.e. bits per pixel, BPP), referred from [28, 29] has been considered for comparison. From Table 1, it is concluded that the capacity of proposed bit flipping technique is more than that of existing technique. The capacity of Bit flipping-2 is 1.5 times larger compared to the existing method. The PSNR of the proposed techniques is acceptable i.e. more than 40. If we compare among the three proposed techniques the bit flipping-2 is preferable for higher hiding capacity. The cover images are shown in Figure 1. (a)-(h) and the resulting images for bit flipping-1, bit flipping-2 schemas respectively are shown in Figure 2. (a)- (h) and Figure 3. (a)- (h), with 2,45,000 bits of data are concealed in each. It is a clear indication that the resulting images are indistinguishable and do not show any identification areas. (a) Lena (b) Baboon (c) Peppers (d) Boat
  • 5. IJ-ICT ISSN: 2252-8776  Digital Image Steganography Using Bit Flipping (Aditya Kumar Sahu) 5 (e) House (f) Baby (g) Barbara (h) Bird Figure 1. (a)-(h) Original Images (a) Lena (b) Baboon (c) Peppers (d) Boat (e) House (f) Baby (g) Barbara (h) Bird Figure 2. (a)-(h) Resulting Images of Bit Flipping-1 (a) Lena (b) Baboon (c) Peppers (d) Boat
  • 6.  ISSN: 2252-8776 IJ-ICT Vol. 7, No. 1, April 2018 : 1– 7 6 (e) House (f) Baby (g) Barbara (h) Bird Figure 3. (a)-(h) Resulting Images of Bit Flipping-2 Table 1. Results of Proposed Bit Flipping -1 and Bit Flipping-2 Schemes Images 512×512 Existing Bit flipping technique [2] Proposed Bit flipping-1 technique Proposed Bit flipping-2 technique PSNR Capacity Q.I BPP PSNR Capacity Q.I BPP PSNR Capacity Q.I BPP Lena 51.27 262144 0.98 1 47.38 393216 0.97 1.5 47.31 524288 0.97 2.0 Baboon 51.27 262144 0.99 1 47.36 393216 0.99 1.5 47.33 524288 0.99 2.0 Peppers 51.28 262144 0.98 1 47.39 393216 0.97 1.5 47.32 524288 0.97 2.0 Boat 51.27 262144 0.99 1 47.20 393216 0.98 1.5 47.19 524288 0.98 2.0 House 51.28 262144 0.99 1 47.37 393216 0.98 1.5 47.30 524288 0.98 2.0 Baby 51.27 262144 0.97 1 47.36 393 16 0.94 1.5 47.31 524288 0.94 2.0 Barbara 51.27 262144 0.98 1 47.34 393216 0.96 1.5 47.30 524288 0.96 2.0 Bird 51.26 262144 0.89 1 47.80 393216 0.87 1.5 47.66 524288 0.88 2.0 Average 51.27 262144 0.97 1 47.40 393216 0.96 1.5 47.34 524288 0.96 2.0 5. CONCLUSION This article proposes a modified bit flipping technique for hiding information in an image called as bit flipping-1 and bit flipping-2. The proposed bit flipping-1 offers a capacity of 3 bits for a pair of pixels. The bit flipping-2 offers a capacity of 4 bits for a pair of pixels. Thus the capacities of the proposed techniques are improved. Furthermore, it is quite clear from the resulting images that it is not susceptible to the invader. REFERENCES [1] Johnson, N. F., Jajodia, S. “Exploring steganography: seeing the unseen”. IEEE Computer, 1998; 31(2): 26–34. [2] Kumar, R., Chand, S. “A reversible data hiding scheme using bit flipping strategy”. Journal of Discrete Mathematical Sciences and Cryptography, 2016; 19(2): 331-345. [3] Pradhan, A., Sahu, A.K., Swain, G., & Sekhar, K.R. Performance evaluation parameters of image steganography techniques. International Conference on Research Advances in Integrated Navigation Systems, 2016, DOI: 10.1109/RAINS.2016.7764399. [4] Swain, G., Lenka, S. K. “Classification of Image Steganography Techniques in Spatial Domain : A Study”. International Journal of Computer Science & Engineering Technology, 2014; 5(3): 219–232. [5] Sahu, A. K., Swain, G. A. “Review on LSB substitution and PVD based image steganography techniques”. Indonesian Journal of Electrical Engineering and Computer Science, 2016; 2(3): 712-719. [6] Sahu, A. K, Sahu M. “Digital image steganography techniques in spatial domain: a study”, International Journal of Pharmacy & Technology, 2016; 8(4): 5205- 5217. [7] Wang, R., Lin, C., Lin, J. “Hiding data in images by optimal moderately-significant-bit replacement”. Electronics Letters, 2000; 36(25): 2069–2070. [8] Wang, R. Z., Lin, C. F., Lin, J. C. “Image hiding by optimal LSB substitution and genetic algorithm”. Pattern Recognition, 2001; 34(3): 671–683. [9] Chan, C. K., Cheng, L. M. “Hiding data in images by simple LSB substitution”. Pattern Recognition, 2004; 37(3): 469–474. [10] Swain, G., Lenka, S. K. “A technique for secret communication using a new block cipher with dynamic steganography”. International Journal of Security and Its Applications, 2012; 6(4): 13–24. [11] Fridrich, J., Goljan, M., Du, R. “Reliable detection of LSB steganography in grayscale and color images”. ACM Workshop on Multimedia and Security, 2001, 27–30. http://doi.org/10.1145/1232454.1232466. [12] Wu, D. C., Tsai, W. H. “A steganographic method for images by pixel-value differencing”. Pattern Recognition Letters, 2003; 24(9–10): 1613–1626. [13] Yang, C. H., Weng, C. Y., Wang, S. J., Sun, H. M. “Adaptive data hiding in edge areas of images with spatial LSB domain systems”. IEEE Transactions on Information Forensics and Security, 2008; 3(3): 488–497. [14] Wu, H.C., Wu, N.I. Tsai, C.S., Hwang, M.S. “An image steganographic scheme based on pixel-value differencing and LSB replacement methods”. IEE Proceedings- Vision Image Signal Processing, 2005; 152(5): 611–615.
  • 7. IJ-ICT ISSN: 2252-8776  Digital Image Steganography Using Bit Flipping (Aditya Kumar Sahu) 7 [15] Yang, C. H., Weng, C. Y., Wang, S. J., Sun, H. M. “Varied PVD + LSB evading detection programs to spatial domain in data embedding systems”. Journal of Systems and Software, 2010; 83(10): 1635–1643. [16] Wang, C.M., Wu, N.I., Tsai, C.S., Hwang, M.S. “A high quality steganographic method with pixel-value differencing and modulus function”. The journal of system and software, 2008; 81: 150–158. [17] Liao, X., Wen, Q. Y., Zhang, J. “A steganographic method for digital images with four-pixel differencing and modified LSB substitution”. Journal of Visual Communication and Image Representation, 2011, 22(1), 1–8. [18] Swain, G. “Digital image steganography using nine-pixel differencing and modified LSB substitution”. Indian Journal of Science and Technology, 2014; 7(9): 1444–1450. [19] Malik, A., Sikka, G., Verma, H. K. “A modified pixel-value differencing image steganographic scheme with least significant bit substitution method”. International Journal of Image, Graphics and Signal Processing. 2015; 4: 68–74. [20] Pradhan, A., Sekhar K. R., Swain G. “Digital image steganography based on seven way pixel value differencing”. Indian Journal of Science &Technology,2016,9(37),pp.1-11, doi: 10.17485/ijst/2016/v9i37/88557. [21] Pradhan, A., Sekhar K. R., Swain G. Digital image steganography combining LSB substitution with five way PVD in 2×3 pixel blocks, International Journal of Pharmacy and Technology, 2016; 8(4): 22051-22061 [22] Swain G. “A steganographic method combining LSB substitution and PVD in a block”. Procedia Computer Science, 2016; 85: 39-44. [23] Swain G. “Adaptive pixel value differencing steganography using both vertical and horizontal edges”. Multimedia Tools and Applications, 2016; 75(21): 13541-13556 [24] Swain, G. “Digital image steganography using variable length group of bits substitution”. Procedia Computer Science, 2016; 85: 31–38. [25] Juneja, M., Sandhu, P. S. “Designing of robust image steganography technique based on LSB insertion and encryption”. International Conference on Advances in Recent Technologies in Communication and Computing, 2009: 302–305. [26] Swain, G., Lenka, S. K. “LSB array based image steganography technique by exploring the four least significant bits”. Global Trends in Information Systems and Software Applications. 2012. CCIS, 479-488. [27] Swain, G., Lenka, S. K. “A novel steganography technique by mapping words with LSB array”. International Journal of Signal and Imaging Systems Engineering, 2015; 8(1): 115–122. [28] Wang, Z., Bovik, A. “A universal image quality index”. IEEE Signal Processing Letters, 2002; 9(3): 81–84. [29] Sahu, A.K., Swain, G. “Information Hiding Using Group of Bits Substitution”. International Journal on Communication Antenna and Propagation.2017. https://doi.org/10.15866/irecap.v7i2.11675.