SlideShare a Scribd company logo
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
Volume 7, Issue 1, Ver. I (Jan. - Feb. 2017), PP 38-43
e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197
www.iosrjournals.org
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 38 | Page
An Improved Adaptive Steganographic Method Based on
Least Significant Bit Substitution and
Pixel-Value Differencing
Varun sangwan
Sangwan.varun@gmail.com
Abstract: This paper presents a novel technique for improved data embedding in cover images based on
least significant bit and pixel-value differencing. The proposed method is based on the properties of human
visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore,
the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount
of data in smooth areas. The results of the proposed method are verified using extensive simulations.
Keywords: pixel-value differencing (PVD), imperceptibility, steganography, PSNR, HVS, least significant
bit (LSB) substitution.
I. Introduction
Steganography is not a new concept. Although the term steganography was coined at the
end of the 15th
century, it is believed that steganography was first practiced during the Golden Age
in Greece. In ancient times, messages were hidden on the wax tables, written on the stomachs of
rabbits, or tattooed on the messenger‟s head [1]. Modern steganography makes use of the digital
multimedia files such as audio, video, image etc for data hiding. Images are widely used digital
media on the Internet, so most steganographic algorithms are implemented on images. The secret
information is embedded into the cover image to obtain the stego image, which is then used for
transmission via a public channel [2].
This paper focuses on achieving both high embedding capacity of cover image as well as high
image quality. This objective is achieved by making use of two techniques: (i) LSB substitution [3], which
belongs to category one, and (ii) PVD [4], which belongs to category two.
The remaining sections of the paper are organized as follows. In section 2, the literature review is
described. In Section 3, the proposed method is presented. In section 4, several experimental results are
presented to demonstrate the performance of proposed scheme. Finally, conclusions are given in Section 5.
II. Literature Review
2.1 PVD method
In 2003, Wu and Tsai used basic property of HVS system and presented a steganography method
using PVD [4]. This method hides different amount of secret bits in consecutive non-overlapping pixel
pairs by taking the difference value between the pixels of a pixel pair. This method partitions the given
cover image into non-overlappings blocks with two consecutive pixels, say 𝑝𝑖 and 𝑝𝑖+1 .Wu and Tsai
designed a range table 𝑅𝑗 with ranges varying from 0 to 255. The range table 𝑅𝑗 has six ranges as 𝑅1=[0,7],
𝑅2=[8,15], 𝑅3=[16,31], 𝑅4=[32,63], 𝑅5=[64,127] and 𝑅6=[128,255]. The lower bound and upper bound
value of each range is given by 𝑙𝑗 and 𝑢𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑢𝑗 − 𝑙𝑗 + 1. The
method of hiding secret data into the non-overlapping blocks is as follows:
1. Calculate the difference value between the two pixels of each block, 𝑑𝑖 = 𝑝𝑖 − 𝑝𝑖+1 .
2. Find the range to which the above calculated 𝑑𝑖 belongs to.
3. Compute how many bits of secret data can be embedded in each block of pixel pair, 𝑡𝑗 = 𝑙𝑜𝑔2 𝑅𝑗 .
4. Read 𝑡𝑗 bits from the binary secret data stream and covert into a decimal value 𝑠𝑖.
5. Calculate the new difference value, 𝑑𝑖
′
= 𝑙𝑗 + 𝑠𝑖.
6. Modify the pixels 𝑝𝑖 and 𝑝𝑖+1 as,
An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 39 | Page
𝑝𝑖
′
, 𝑝𝑖+1
′
=
𝑝𝑖 +
𝑧
2
, 𝑝𝑖+1 −
𝑧
2
𝑖𝑓 𝑝𝑖 ≥ 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖
′
> 𝑑𝑖
𝑝𝑖 −
𝑧
2
, 𝑝𝑖+1 +
𝑧
2
𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖
′
> 𝑑𝑖
𝑝𝑖 −
𝑧
2
, 𝑝𝑖+1 +
𝑧
2
𝑖𝑓 𝑝𝑖 ≥ 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖
′
≤ 𝑑𝑖
𝑝𝑖 +
𝑧
2
, 𝑝𝑖+1 −
𝑧
2
𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖
′
≤ 𝑑𝑖
(1)
where𝑧 = 𝑑𝑖 − 𝑑𝑖
′
. This process is repeated for each of the block to obtain the stego image.
2.2 PVD and LSB replacement method
In 2005, Wu et al. proposed a steganographic method inspired by PVD technique [4]. This
method partitions the given cover image into non-overlappings blocks with two consecutive pixels, say 𝑝𝑖
and 𝑝𝑖+1. Here, the range table 𝑅𝑗 with ranges varying from 0 to 255 is divided into „lower level‟ and
„higher level‟. In case of div=15, lower level contains ranges 𝑅1=[0,7] and 𝑅2=[8,15] while higher level
contains ranges 𝑅3 =[16,31], 𝑅4 =[32,63], 𝑅5 =[64,127] and 𝑅6 =[128,255]. The lower bound and upper
bound value of each range is given by 𝑙𝑗 and 𝑢𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑢𝑗 − 𝑙𝑗 + 1.
Now, for each block difference value is calculated as, 𝑑𝑖 = 𝑝𝑖 − 𝑝𝑖+1 .
Case I: If the difference value 𝑑𝑖falls in the range of lower level, then LSB substitution method is used to
embed 6-bits of secret data. The procedure is as follows:
Let the 6-bits secret data is S=𝑎1, 𝑎2, 𝑎3, 𝑎4, 𝑎5, 𝑎6.
1. Replace 3-LSB of 𝑝𝑖 with 𝑎1, 𝑎2, 𝑎3 to obtain 𝑝𝑖
′
.
2. Replace 3-LSB of 𝑝𝑖+1 with 𝑎4, 𝑎5, 𝑎6 to obtain 𝑝𝑖+1
′
.
3. Calculate the new difference value 𝑑𝑖
′
= 𝑝𝑖
′
− 𝑝𝑖+1
′
.
4. If the new difference value falls in the higher level, then perform the readjusting operation.
𝑝𝑖
′
, 𝑝𝑖+1
′
=
𝑝𝑖
′
− 8, 𝑝𝑖+1
′
+ 8 𝑖𝑓 𝑝𝑖
′
≥ 𝑝𝑖+1
′
𝑝𝑖
′
+ 8, 𝑝𝑖+1
′
− 8 𝑖𝑓 𝑝𝑖
′
< 𝑝𝑖+1
′ (2)
Case II: If the difference value 𝑑𝑖 falls in the higher level range then PVD method is used to embed secret
data bits in pixel pairs.
2.2Adaptive PVD and LSB replacement method
Khodaei and Faez proposed a method for data hiding in 2012 based on optimum pixel adjustment
process (OPAP) and PVD [5]. In this method,the cover image is divided into consecutive non-overlapping
blocks of size 1×3 in raster scan manner. Each block 𝐵𝑖has a centre pixel named as base pixel 𝑝𝑖𝑐 . The
following steps perform data embedding in each block:
1. Consider k-rightmost LSBs of 𝑝𝑖𝑐 and transform these three LSBs to a decimal value, say 𝐿𝑆𝐵𝑖. Read
k-bits from binary secret data in continuation and replace the k LSBs of 𝑝𝑖𝑐 with these binary secret
data bits to obtain 𝑝𝑖𝑐
′
. Also, transform these bits to a decimal value, say 𝑠𝑖𝑐 .
2. Compute the difference value 𝑑using 𝑑 = 𝐿𝑆𝐵𝑖 − 𝑠𝑖𝑐 .
3. Modify 𝑝𝑖𝑐
′
using OPAP as follows:
𝑝𝑖𝑐
′
=
𝑝𝑖𝑐
′
+ 2 𝑘
𝑖𝑓 𝑑 > 2 𝑘−1
𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑐
′
+ 2 𝑘
≤ 255
𝑝𝑖𝑐
′
− 2 𝑘
𝑖𝑓 𝑑 < −2 𝑘−1
𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑐
′
− 2 𝑘
≤ 255
𝑝𝑖𝑐
′
𝑜𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒
(3)
4. Compute the absolute difference values between the base pixel and other pixels of the block by using
𝑑𝑖𝑗 = 𝑝𝑖𝑗 − 𝑝𝑖𝑐
′
; (𝑖, 𝑗) ≠ (1,2) (4)
where𝑖 and 𝑗denotes the location of the pixel in a block.
5. Assign the ranges corresponding to the differences found in Step 4 and obtain the lower bounds too
i.e. 𝑙𝑖𝑗 . Accordingly, calculate 𝑡𝑖𝑗 which denotes the number of bits to be concealed into first and third
pixels of the block.
6. Read tij bits in continuation from the binary secret message and transform these bit-sequences
into decimalvalues, say 𝑠𝑖𝑗 . Now, compute the new difference values using
𝑑𝑖𝑗
′
= 𝑙𝑖𝑗 + 𝑠𝑖𝑗 (5)
7. Calculate the two new values of each pixel of a block using
An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 40 | Page
𝑝𝑖𝑗
′′
= 𝑝𝑖𝑐
′
− 𝑑𝑖𝑗
′
𝑝𝑖𝑗
′′′
= 𝑝𝑖𝑐
′
+ 𝑑𝑖𝑗
′
(6)
8. Choose the best new value for these pixels from the values obtained in Step 7 using
𝑝𝑖𝑗
′
=
𝑝𝑖𝑗
′′
𝑖𝑓 𝑝𝑖𝑗 − 𝑝𝑖𝑗
′′
< 𝑝𝑖𝑗 − 𝑝𝑖𝑗
′′′
𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑗
′′
≤ 255
𝑝𝑖𝑗
′′′
𝑜𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒
(7)
Repeat the above procedure for each block 𝐵𝑖 of the cover image so as to obtain the final stego image.
III. Proposed work
This section presents a method, which utilizes LSB substitution and PVD techniques for data hiding. The
method consists of three phases: (i) range division phase, (ii) embedding phase and (iii) extracting phase.
These phases are presented in next subsections.
3.1 Range division phase
Prior to embedding the secret message, the grey level range [0,255] is divided into five ranges
𝐼𝑅 𝑛 (𝑛 = 1, … ,5) where 𝐼𝑅 𝑛 = [𝑙 𝑛 , 𝑢 𝑛 ] , 𝑙 𝑛 denotes the lower bound of the range 𝐼𝑅 𝑛 and 𝑢 𝑛 denotes the
upper bound of the range 𝐼𝑅 𝑛 . These five ranges can be 𝐼𝑅1 = [0,7], 𝐼𝑅2 = [8,15], 𝐼𝑅3 = [16,31],
𝐼𝑅4 = [32,63] and 𝐼𝑅5 = [64,255]. Fig. 1 shows the dividing case i.e. div=15 for the proposed method. It
divides the range [0,255] into „lower level‟ which consist of ranges 𝐼𝑅1 = [0,7], 𝐼𝑅2 = [8,15] and „higher
level‟ which include ranges𝐼𝑅3 = [16,31],𝐼𝑅4 = [32,63], 𝐼𝑅5 = [64,255]. Let 𝑡 𝑛 are the number of bits to
be embedded in the pixels falling under the range 𝑅 𝑛 . According to HVS, changes in edge areas are less
visible than smooth areas and hence, more data can be embedded in edges. In the proposed
method, first two ranges (𝐼𝑅1, 𝐼𝑅2) fall under the category of smooth regions whereas last threeranges
( 𝐼𝑅3, 𝐼𝑅4, 𝐼𝑅5) falls in the edge regions. Therefore, we propose to embed 3 bits in the lower level and 4
bits in the higher level.
Lower-level Higher-level
𝐼𝑅1=[0,7] 𝐼𝑅2=[8,15] 𝐼𝑅3=[16,31] 𝐼𝑅4=[32,63] 𝐼𝑅5=[64,255]
Fig.1 The dividing case (div=15) of the proposed method with „lower level‟ and higher level‟
3.2 Embedding phase
Initially the cover image is divided into non-overlapping blocks having four consecutive pixels
each, in raster scan manner. So, each block consists of four pixels. The data embedding will be
performed in second and third pixel first and then in third and fourth pixel. The following steps
perform data embedding in each block:
1. The secret data will be embedded into the second and third pixel say, 𝑝𝑖2and 𝑝𝑖3using PVD –LSB
method as described in section 2.2. After data embedding we will get new pixels 𝑝𝑖2
′
and 𝑝𝑖3
′
.
2. Now , data embedding in remaining pixels of the block will take place using adaptive PVD-LSB
replacement method as mentioned in section 2.3. Compute the absolute difference between first pixel
𝑝𝑖1and 𝑝𝑖2
′
say, 𝑑𝑖 and the absolute difference between fourth pixel𝑝𝑖4 and 𝑝𝑖3
′
say, 𝑑𝑖+1.
3. Assign the ranges corresponding to the differences found in Step 2 and obtain the lower bounds too
i.e. 𝑙𝑖 and 𝑙𝑖+1 Accordingly, calculate 𝑡𝑖and 𝑡𝑖+1which denotes the number of bits to be concealed.
4. Read 𝑡𝑖and 𝑡𝑖+1 bits in continuation from the binary secret message and transform these bit-
sequences into decimalvalues, say 𝑠𝑖and 𝑠𝑖+1 . Now, compute the new difference values using
𝑑𝑖
′
= 𝑙𝑖 + 𝑠𝑖
𝑑𝑖+1
′
= 𝑙𝑖+1 + 𝑠𝑖+1 (8)
5. Calculate the two new values of first and fourth pixel of a block using
𝑝𝑖1
′′
= 𝑝𝑖2
′
− 𝑑𝑖
′
𝑝𝑖1
′′′
= 𝑝𝑖2
′
+ 𝑑𝑖
′
𝑝𝑖4
′′
= 𝑝𝑖3
′
− 𝑑𝑖+1
′
𝑝𝑖4
′′′
= 𝑝𝑖3
′
+ 𝑑𝑖+!
′
(9)
6. Choose the best new value from step 5 using
𝑝𝑖1
′
=
𝑝𝑖1
′′
𝑖𝑓 𝑝𝑖1 − 𝑝𝑖1
′′
< 𝑝𝑖1 − 𝑝𝑖1
′′′
𝑎𝑛𝑑 0 ≤ 𝑝𝑖1
′′
≤ 255
𝑝𝑖1
′′′
𝑜𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒
An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 41 | Page
𝑝𝑖2
′
=
𝑝𝑖2
′′
𝑖𝑓 𝑝𝑖2 − 𝑝𝑖2
′′
< 𝑝𝑖2 − 𝑝𝑖2
′′′
𝑎𝑛𝑑 0 ≤ 𝑝𝑖2
′′
≤ 255
𝑝𝑖2
′′′
𝑜𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒
(10)
Repeat the above procedure for every block of the cover image so as to obtain the final stego image.
3.3 Extracting phase
In this part the secret data is obtained from the stego image. The stego image is partitioned into non-
overlapping block of size 1x4 and then for the complete extraction of the secret message following steps
are executed.
1. The data is extracted from the second and third pixel of the block first. Compute the difference
between the two pixel values say 𝑑𝑖
′
. If the difference lies in lower level of the range table then read
three LSB bits from both pixels and concatenate the data bits and call it 𝑠𝑖𝑐 .
2. If the difference lies in the higher level then find out the difference between the lower bound of
corresponding range and 𝑑𝑖
′
, call it b. Find out t i.e. number of concealed bits and covert b into t
number of bits. This string of bits is say, 𝑠𝑖𝑐 .
3. Calculate the absolute difference valuesbetween the 1st
& 2nd
pixel and 3rd
&4th
pixels of a block and
find the range to which these difference values belong to. Then, obtain the lower bound 𝑙𝑖and 𝑙𝑖+1of
the corresponding range and also determine the number of bits 𝑡𝑖and 𝑡𝑖+1to be extracted from each
pixel.
4. Obtain the secret data sub-streams as 𝑠𝑖1and 𝑠𝑖2 by taking the difference between above calculated
difference values and respective lower bounds. Transform 𝑠𝑖1and 𝑠𝑖2 to binary strings with length
equivalent to𝑡𝑖and 𝑡𝑖+1.
Finally, concatenate 𝑠𝑖𝑐 ,𝑠𝑖1and 𝑠𝑖2to obtain the original bit sequence of the secret message.
IV. Experimental Results
This section presents the experimental results of the proposed method. The test images used for
verifying the results are greyscale images of size 512X512, namely „Lena‟, „Baboon‟, „Boat‟ and
„Peppers‟. For the performance evaluation of any steganography method, the three main criteria can be
used:
(i) Capacity: Capacity is defined as the maximum amount of secret message that can be stored in a cover
image [6].
(ii) Imperceptibility: It defines the similarity between the cover image and the stego image. The value of
PSNR is used to define imperceptibility and is given by:
𝑀𝑆𝐸 =
1
𝑀×𝑁
2
1 1
( ( , ) ( , ))
M N
i j
I i j Y i j
 
 (11)
𝑃𝑆𝑁𝑅 = 10𝑙𝑜𝑔10
𝑀𝑎𝑥 2
𝑀𝑆𝐸
(12)
where MxN denotes the size of the cover image I and stego image Y. A high PSNR value means good
quality of stego image whereas a low PSNR means the opposite[7] [8][9].
(iii) Robustness: Robustness is the property that provides the resistance against elimination of secret
information from the stego image. It can be examined through steganalysis. Various steganalytic methods
have been developed to detect the hidden message from the cover media [10][11][12][13].
Fig. 2 shows the changes are unobservable even after large data embedding in the cover image.
Hence, the proposed method provides good image quality. Imperceptibility of the proposed method is
governed by Table 1, which shows the good PSNR value in comparison to PVD-LSB method. Also, the
embedding capacity is higher as compared to PVD-LSB method.The graph in Fig 3.shows the changes that
occur in histogram due to data embedding [9]. It is clear from the fig. 3 that proposed method induces less
uncompensated change in the histogram and therefore is more secure than PVD-LSB method.
An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 42 | Page
(a) (b)
Fig. 2. (a) standard cover images (b) stego images embedded with data using proposed method.
Cover images Method Embedding capacity (bits) PSNR (db) Robustness
Lena PVD-LSB 766,040 36.16 Less
Proposed 777,255 36.5076 More
Peppers PVD-LSB 770,248 35.34 Less
Proposed 77,8591 35.2305 More
Baboon PVD-LSB 717,848 32.63 Less
Proposed 768,538 33.1523 More
Boat PVD-LSB 756,768 33.62 Less
Proposed 776,904 33.9226 More
Table 1. Comparison of the results between PVD-LSB and proposed method.
An improved adaptive steganographic method based on least significant bit substitution and pixel-..
DOI: 10.9790/4200-0701013843 www.iosrjournals.org 43 | Page
Fig. 3. Uncompensated changes in histogram after embedding via proposed method and PVD- LSB
method.
V. Conclusions
In this paper, a histogram preserving data hiding method is presented which is based on LSB
substitution and PVD. This method can hide large amount of secret data as well as provide an
imperceptible stego image quality while compensating for the dissimilarity between the histograms of the
cover and stego images. This advantage of keeping the change in image histogram within permissible limit
helps the proposed method to show better resistance against histogram based steganalysers.
References
[1]. F. Petitcolas, R. Anderson, M. Kuhn, “Information hiding - a survey”, Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078,1999.
[2]. A.A.J. Altaay, S. bin Sahib, M. zamani, “An introduction to image steganography techniques,” Int. Conf. Advanced
Computer Science Applications and Technologies, pp. 122-126, 2012.
[3]. C.K.Chan, L.M. Cheng, “ Hiding data in image by simple LSB substitution”, pattern recognition, vol. 37, no. 3, pp.
469-474, 2004.
[4]. M. Khodaei, K. Faez, “New adaptive steganographic method using least-significant- bit substitution and pixel value
differencing,” IET Image Process.,vol.6, iss.6, pp. 677-686, 2012.
[5]. H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB
replacement methods”, IEE Proc.Vis. Image SignalProcess., vol. 152, no. 5, pp. 611-615, 2005.
[6]. C.M. Wang, N.I. Wu, C.S. Tsai, M.S. Hwang, “A high quality steganographic method with pixel- value differencing and
modulus function”, The Journal of Systems and Software, vol.81,pp. 150-158, 2008.
[7]. A.D.Kher, “Improved detection of LSBsteganography in grayscale images”, Lecture Notes in Computer Science, vol. 3200,
pp. 583-592, 2005.
[8]. J.Mielikainen, “LSB matching revisited”, IEEE Signal Process. Lett.,vol. 13, no. 5, pp. 285- 287, 2006.
[9]. S. Sarreshtedari, M. A. Akhaee, “ One-third probability embedding: a new ±histogram Compensating image LSB
steganography scheme”, IET Image Process., vol. 8, iss.2, pp. 78-89, 2014.
[10]. N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality of LSB based image steganography,” 5th Int.
Conf. Computational Intelligence and Communication Networks, pp. 385-390, 2013.
[11]. A. Westfeld, A. Pfitzmann, “Attacks on Steganographic Systems,” Lecture Notes in Computer Science, Springer-Verlag,
vol. 1768, pp. 61-75, 2000.
[12]. J. Fridrich, M. Goljan, R. Du, “Reliable detection of LSB steganography in color and grayscale images”, Proc. ACM
workshop on Multimedia and Security, pp.27-30, 2001.
[13]. A.D. Kher, “Steganalysis of LSB Matching in grayscale images”, IEEE Signal Process. Lett., vol. 12,No. 6, pp. 441-444,
2005.
[14]. R.C. Gonzalez, R.E. Woods, “Digital image processing”, Third edition, New Jersey,Pearson, 2011.
[15]. J.C. Russ, “The image processing handbook”, Sixth Edition, USA, Taylor and Francis Group, 2011.
[16]. Tel Aviv University, “ Image Database”, http://www.math.tau.ac.il/~turkel/image.html.
[17]. The USC-SIPI Image Database,http://sipi.usc.edu/database.
[18]. Amit bhanwala, Mayank kumar, yogendra Kumar,” FPGA based Design of Low Power Reconfigurable Router for Network
on Chip (NoC)”, ISBN:978-1-4799-8890 ©2015 IEEE,International Conference on Computing, Communication and
Automation (ICCCA2015), pp- 1320 - 1326, DOI: 10.1109/CCAA.2015.7148581.
[19]. Mayank kumar, Kishore kumar, sanjiv kumar gupta, yogendra Kumar,” FPGA based Design of Area efficient router
Architecture for Network on Chip (NoC)”, IEEE,International Conference on Computing, Communication and Automation
(ICCCA2016), pp-1600 - 1605, DOI: 10.1109/CCAA.2016.7813980.

More Related Content

What's hot

Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
mmjalbiaty
 
FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020
RohanLekhwani
 
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
ijistjournal
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
CSCJournals
 
K-means Clustering Algorithm with Matlab Source code
K-means Clustering Algorithm with Matlab Source codeK-means Clustering Algorithm with Matlab Source code
K-means Clustering Algorithm with Matlab Source code
gokulprasath06
 
Cluster analysis using k-means method in R
Cluster analysis using k-means method in RCluster analysis using k-means method in R
Cluster analysis using k-means method in R
Vladimir Bakhrushin
 
Fuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Fuzzy Encoding For Image Classification Using Gustafson-Kessel AglorithmFuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Fuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Ashish Gupta
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
CSCJournals
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
IJNSA Journal
 
Data scientist training in bangalore
Data scientist training in bangaloreData scientist training in bangalore
Data scientist training in bangalore
prathyusha1234
 

What's hot (11)

Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
Image Interpolation Techniques with Optical and Digital Zoom Concepts -semina...
 
FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020FastV2C-HandNet - ICICC 2020
FastV2C-HandNet - ICICC 2020
 
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
Multi-Level Coding Efficiency with Improved Quality for Image Compression bas...
 
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion RatioDeveloping 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
Developing 3D Viewing Model from 2D Stereo Pair with its Occlusion Ratio
 
K-means Clustering Algorithm with Matlab Source code
K-means Clustering Algorithm with Matlab Source codeK-means Clustering Algorithm with Matlab Source code
K-means Clustering Algorithm with Matlab Source code
 
I07015261
I07015261I07015261
I07015261
 
Cluster analysis using k-means method in R
Cluster analysis using k-means method in RCluster analysis using k-means method in R
Cluster analysis using k-means method in R
 
Fuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Fuzzy Encoding For Image Classification Using Gustafson-Kessel AglorithmFuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
Fuzzy Encoding For Image Classification Using Gustafson-Kessel Aglorithm
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
 
Data scientist training in bangalore
Data scientist training in bangaloreData scientist training in bangalore
Data scientist training in bangalore
 

Similar to An Improved Adaptive Steganographic Method Based on Least Significant Bit Substitution and Pixel-Value Differencing

A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAP
IOSRJVSP
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation
IJEEE
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
ijistjournal
 
Adaptive data hiding in edge areas of images with spatial lsb domain systems
Adaptive data hiding in edge areas of images with spatial lsb domain systemsAdaptive data hiding in edge areas of images with spatial lsb domain systems
Adaptive data hiding in edge areas of images with spatial lsb domain systems
Ammory Ali
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
Editor IJMTER
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
tayseer Karam alshekly
 
Substitution-diffusion based Image Cipher
Substitution-diffusion based Image CipherSubstitution-diffusion based Image Cipher
Substitution-diffusion based Image Cipher
IJNSA Journal
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency Domains
CSCJournals
 
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionA Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
IJERA Editor
 
Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057
Budi Santo
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
eSAT Publishing House
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
Eswar Publications
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
IOSR Journals
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
cscpconf
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
IJEEE
 
Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Pioneer Natural Resources
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...
Akash Rawat
 
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
IJERA Editor
 

Similar to An Improved Adaptive Steganographic Method Based on Least Significant Bit Substitution and Pixel-Value Differencing (20)

A Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAPA Hybrid Steganography Technique Based On LSBMR And OPAP
A Hybrid Steganography Technique Based On LSBMR And OPAP
 
Id62
Id62Id62
Id62
 
A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation A new hybrid steganographic method for histogram preservation
A new hybrid steganographic method for histogram preservation
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Adaptive data hiding in edge areas of images with spatial lsb domain systems
Adaptive data hiding in edge areas of images with spatial lsb domain systemsAdaptive data hiding in edge areas of images with spatial lsb domain systems
Adaptive data hiding in edge areas of images with spatial lsb domain systems
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
 
Substitution-diffusion based Image Cipher
Substitution-diffusion based Image CipherSubstitution-diffusion based Image Cipher
Substitution-diffusion based Image Cipher
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency Domains
 
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB SubstitutionA Robust Method for Image Watermarking Using Block Differencing LSB Substitution
A Robust Method for Image Watermarking Using Block Differencing LSB Substitution
 
Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057
 
An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...An enhanced difference pair mapping steganography method to improve embedding...
An enhanced difference pair mapping steganography method to improve embedding...
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
 
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
Hybrid Technique for Copy-Move Forgery Detection Using L*A*B* Color Space
 
Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...
 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...
 
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
A Hybrid Technique for the Automated Segmentation of Corpus Callosum in Midsa...
 

More from IOSRJVSP

PCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewPCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-Review
IOSRJVSP
 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
IOSRJVSP
 
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
IOSRJVSP
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
IOSRJVSP
 
Analyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAMAnalyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAM
IOSRJVSP
 
Robust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceRobust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory Interface
IOSRJVSP
 
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
IOSRJVSP
 
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
IOSRJVSP
 
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
IOSRJVSP
 
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
IOSRJVSP
 
P-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWTP-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWT
IOSRJVSP
 
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
IOSRJVSP
 
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
IOSRJVSP
 
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
IOSRJVSP
 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IOSRJVSP
 
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...
IOSRJVSP
 
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesRetinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
IOSRJVSP
 
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionSpeech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
IOSRJVSP
 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
IOSRJVSP
 
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
IOSRJVSP
 

More from IOSRJVSP (20)

PCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewPCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-Review
 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
 
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
 
Analyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAMAnalyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAM
 
Robust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceRobust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory Interface
 
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
 
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
 
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
 
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
 
P-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWTP-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWT
 
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
 
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
 
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
 
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...
 
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesRetinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
 
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionSpeech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
 
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
 

Recently uploaded

哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
Kamal Acharya
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 

Recently uploaded (20)

哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Water billing management system project report.pdf
Water billing management system project report.pdfWater billing management system project report.pdf
Water billing management system project report.pdf
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 

An Improved Adaptive Steganographic Method Based on Least Significant Bit Substitution and Pixel-Value Differencing

  • 1. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 7, Issue 1, Ver. I (Jan. - Feb. 2017), PP 38-43 e-ISSN: 2319 – 4200, p-ISSN No. : 2319 – 4197 www.iosrjournals.org DOI: 10.9790/4200-0701013843 www.iosrjournals.org 38 | Page An Improved Adaptive Steganographic Method Based on Least Significant Bit Substitution and Pixel-Value Differencing Varun sangwan Sangwan.varun@gmail.com Abstract: This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations. Keywords: pixel-value differencing (PVD), imperceptibility, steganography, PSNR, HVS, least significant bit (LSB) substitution. I. Introduction Steganography is not a new concept. Although the term steganography was coined at the end of the 15th century, it is believed that steganography was first practiced during the Golden Age in Greece. In ancient times, messages were hidden on the wax tables, written on the stomachs of rabbits, or tattooed on the messenger‟s head [1]. Modern steganography makes use of the digital multimedia files such as audio, video, image etc for data hiding. Images are widely used digital media on the Internet, so most steganographic algorithms are implemented on images. The secret information is embedded into the cover image to obtain the stego image, which is then used for transmission via a public channel [2]. This paper focuses on achieving both high embedding capacity of cover image as well as high image quality. This objective is achieved by making use of two techniques: (i) LSB substitution [3], which belongs to category one, and (ii) PVD [4], which belongs to category two. The remaining sections of the paper are organized as follows. In section 2, the literature review is described. In Section 3, the proposed method is presented. In section 4, several experimental results are presented to demonstrate the performance of proposed scheme. Finally, conclusions are given in Section 5. II. Literature Review 2.1 PVD method In 2003, Wu and Tsai used basic property of HVS system and presented a steganography method using PVD [4]. This method hides different amount of secret bits in consecutive non-overlapping pixel pairs by taking the difference value between the pixels of a pixel pair. This method partitions the given cover image into non-overlappings blocks with two consecutive pixels, say 𝑝𝑖 and 𝑝𝑖+1 .Wu and Tsai designed a range table 𝑅𝑗 with ranges varying from 0 to 255. The range table 𝑅𝑗 has six ranges as 𝑅1=[0,7], 𝑅2=[8,15], 𝑅3=[16,31], 𝑅4=[32,63], 𝑅5=[64,127] and 𝑅6=[128,255]. The lower bound and upper bound value of each range is given by 𝑙𝑗 and 𝑢𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑢𝑗 − 𝑙𝑗 + 1. The method of hiding secret data into the non-overlapping blocks is as follows: 1. Calculate the difference value between the two pixels of each block, 𝑑𝑖 = 𝑝𝑖 − 𝑝𝑖+1 . 2. Find the range to which the above calculated 𝑑𝑖 belongs to. 3. Compute how many bits of secret data can be embedded in each block of pixel pair, 𝑡𝑗 = 𝑙𝑜𝑔2 𝑅𝑗 . 4. Read 𝑡𝑗 bits from the binary secret data stream and covert into a decimal value 𝑠𝑖. 5. Calculate the new difference value, 𝑑𝑖 ′ = 𝑙𝑗 + 𝑠𝑖. 6. Modify the pixels 𝑝𝑖 and 𝑝𝑖+1 as,
  • 2. An improved adaptive steganographic method based on least significant bit substitution and pixel-.. DOI: 10.9790/4200-0701013843 www.iosrjournals.org 39 | Page 𝑝𝑖 ′ , 𝑝𝑖+1 ′ = 𝑝𝑖 + 𝑧 2 , 𝑝𝑖+1 − 𝑧 2 𝑖𝑓 𝑝𝑖 ≥ 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖 ′ > 𝑑𝑖 𝑝𝑖 − 𝑧 2 , 𝑝𝑖+1 + 𝑧 2 𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖 ′ > 𝑑𝑖 𝑝𝑖 − 𝑧 2 , 𝑝𝑖+1 + 𝑧 2 𝑖𝑓 𝑝𝑖 ≥ 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖 ′ ≤ 𝑑𝑖 𝑝𝑖 + 𝑧 2 , 𝑝𝑖+1 − 𝑧 2 𝑖𝑓 𝑝𝑖 < 𝑝𝑖+1 𝑎𝑛𝑑 𝑑𝑖 ′ ≤ 𝑑𝑖 (1) where𝑧 = 𝑑𝑖 − 𝑑𝑖 ′ . This process is repeated for each of the block to obtain the stego image. 2.2 PVD and LSB replacement method In 2005, Wu et al. proposed a steganographic method inspired by PVD technique [4]. This method partitions the given cover image into non-overlappings blocks with two consecutive pixels, say 𝑝𝑖 and 𝑝𝑖+1. Here, the range table 𝑅𝑗 with ranges varying from 0 to 255 is divided into „lower level‟ and „higher level‟. In case of div=15, lower level contains ranges 𝑅1=[0,7] and 𝑅2=[8,15] while higher level contains ranges 𝑅3 =[16,31], 𝑅4 =[32,63], 𝑅5 =[64,127] and 𝑅6 =[128,255]. The lower bound and upper bound value of each range is given by 𝑙𝑗 and 𝑢𝑗 . Also, the width of each range is given by 𝑅𝑗 =𝑢𝑗 − 𝑙𝑗 + 1. Now, for each block difference value is calculated as, 𝑑𝑖 = 𝑝𝑖 − 𝑝𝑖+1 . Case I: If the difference value 𝑑𝑖falls in the range of lower level, then LSB substitution method is used to embed 6-bits of secret data. The procedure is as follows: Let the 6-bits secret data is S=𝑎1, 𝑎2, 𝑎3, 𝑎4, 𝑎5, 𝑎6. 1. Replace 3-LSB of 𝑝𝑖 with 𝑎1, 𝑎2, 𝑎3 to obtain 𝑝𝑖 ′ . 2. Replace 3-LSB of 𝑝𝑖+1 with 𝑎4, 𝑎5, 𝑎6 to obtain 𝑝𝑖+1 ′ . 3. Calculate the new difference value 𝑑𝑖 ′ = 𝑝𝑖 ′ − 𝑝𝑖+1 ′ . 4. If the new difference value falls in the higher level, then perform the readjusting operation. 𝑝𝑖 ′ , 𝑝𝑖+1 ′ = 𝑝𝑖 ′ − 8, 𝑝𝑖+1 ′ + 8 𝑖𝑓 𝑝𝑖 ′ ≥ 𝑝𝑖+1 ′ 𝑝𝑖 ′ + 8, 𝑝𝑖+1 ′ − 8 𝑖𝑓 𝑝𝑖 ′ < 𝑝𝑖+1 ′ (2) Case II: If the difference value 𝑑𝑖 falls in the higher level range then PVD method is used to embed secret data bits in pixel pairs. 2.2Adaptive PVD and LSB replacement method Khodaei and Faez proposed a method for data hiding in 2012 based on optimum pixel adjustment process (OPAP) and PVD [5]. In this method,the cover image is divided into consecutive non-overlapping blocks of size 1×3 in raster scan manner. Each block 𝐵𝑖has a centre pixel named as base pixel 𝑝𝑖𝑐 . The following steps perform data embedding in each block: 1. Consider k-rightmost LSBs of 𝑝𝑖𝑐 and transform these three LSBs to a decimal value, say 𝐿𝑆𝐵𝑖. Read k-bits from binary secret data in continuation and replace the k LSBs of 𝑝𝑖𝑐 with these binary secret data bits to obtain 𝑝𝑖𝑐 ′ . Also, transform these bits to a decimal value, say 𝑠𝑖𝑐 . 2. Compute the difference value 𝑑using 𝑑 = 𝐿𝑆𝐵𝑖 − 𝑠𝑖𝑐 . 3. Modify 𝑝𝑖𝑐 ′ using OPAP as follows: 𝑝𝑖𝑐 ′ = 𝑝𝑖𝑐 ′ + 2 𝑘 𝑖𝑓 𝑑 > 2 𝑘−1 𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑐 ′ + 2 𝑘 ≤ 255 𝑝𝑖𝑐 ′ − 2 𝑘 𝑖𝑓 𝑑 < −2 𝑘−1 𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑐 ′ − 2 𝑘 ≤ 255 𝑝𝑖𝑐 ′ 𝑜𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒 (3) 4. Compute the absolute difference values between the base pixel and other pixels of the block by using 𝑑𝑖𝑗 = 𝑝𝑖𝑗 − 𝑝𝑖𝑐 ′ ; (𝑖, 𝑗) ≠ (1,2) (4) where𝑖 and 𝑗denotes the location of the pixel in a block. 5. Assign the ranges corresponding to the differences found in Step 4 and obtain the lower bounds too i.e. 𝑙𝑖𝑗 . Accordingly, calculate 𝑡𝑖𝑗 which denotes the number of bits to be concealed into first and third pixels of the block. 6. Read tij bits in continuation from the binary secret message and transform these bit-sequences into decimalvalues, say 𝑠𝑖𝑗 . Now, compute the new difference values using 𝑑𝑖𝑗 ′ = 𝑙𝑖𝑗 + 𝑠𝑖𝑗 (5) 7. Calculate the two new values of each pixel of a block using
  • 3. An improved adaptive steganographic method based on least significant bit substitution and pixel-.. DOI: 10.9790/4200-0701013843 www.iosrjournals.org 40 | Page 𝑝𝑖𝑗 ′′ = 𝑝𝑖𝑐 ′ − 𝑑𝑖𝑗 ′ 𝑝𝑖𝑗 ′′′ = 𝑝𝑖𝑐 ′ + 𝑑𝑖𝑗 ′ (6) 8. Choose the best new value for these pixels from the values obtained in Step 7 using 𝑝𝑖𝑗 ′ = 𝑝𝑖𝑗 ′′ 𝑖𝑓 𝑝𝑖𝑗 − 𝑝𝑖𝑗 ′′ < 𝑝𝑖𝑗 − 𝑝𝑖𝑗 ′′′ 𝑎𝑛𝑑 0 ≤ 𝑝𝑖𝑗 ′′ ≤ 255 𝑝𝑖𝑗 ′′′ 𝑜𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒 (7) Repeat the above procedure for each block 𝐵𝑖 of the cover image so as to obtain the final stego image. III. Proposed work This section presents a method, which utilizes LSB substitution and PVD techniques for data hiding. The method consists of three phases: (i) range division phase, (ii) embedding phase and (iii) extracting phase. These phases are presented in next subsections. 3.1 Range division phase Prior to embedding the secret message, the grey level range [0,255] is divided into five ranges 𝐼𝑅 𝑛 (𝑛 = 1, … ,5) where 𝐼𝑅 𝑛 = [𝑙 𝑛 , 𝑢 𝑛 ] , 𝑙 𝑛 denotes the lower bound of the range 𝐼𝑅 𝑛 and 𝑢 𝑛 denotes the upper bound of the range 𝐼𝑅 𝑛 . These five ranges can be 𝐼𝑅1 = [0,7], 𝐼𝑅2 = [8,15], 𝐼𝑅3 = [16,31], 𝐼𝑅4 = [32,63] and 𝐼𝑅5 = [64,255]. Fig. 1 shows the dividing case i.e. div=15 for the proposed method. It divides the range [0,255] into „lower level‟ which consist of ranges 𝐼𝑅1 = [0,7], 𝐼𝑅2 = [8,15] and „higher level‟ which include ranges𝐼𝑅3 = [16,31],𝐼𝑅4 = [32,63], 𝐼𝑅5 = [64,255]. Let 𝑡 𝑛 are the number of bits to be embedded in the pixels falling under the range 𝑅 𝑛 . According to HVS, changes in edge areas are less visible than smooth areas and hence, more data can be embedded in edges. In the proposed method, first two ranges (𝐼𝑅1, 𝐼𝑅2) fall under the category of smooth regions whereas last threeranges ( 𝐼𝑅3, 𝐼𝑅4, 𝐼𝑅5) falls in the edge regions. Therefore, we propose to embed 3 bits in the lower level and 4 bits in the higher level. Lower-level Higher-level 𝐼𝑅1=[0,7] 𝐼𝑅2=[8,15] 𝐼𝑅3=[16,31] 𝐼𝑅4=[32,63] 𝐼𝑅5=[64,255] Fig.1 The dividing case (div=15) of the proposed method with „lower level‟ and higher level‟ 3.2 Embedding phase Initially the cover image is divided into non-overlapping blocks having four consecutive pixels each, in raster scan manner. So, each block consists of four pixels. The data embedding will be performed in second and third pixel first and then in third and fourth pixel. The following steps perform data embedding in each block: 1. The secret data will be embedded into the second and third pixel say, 𝑝𝑖2and 𝑝𝑖3using PVD –LSB method as described in section 2.2. After data embedding we will get new pixels 𝑝𝑖2 ′ and 𝑝𝑖3 ′ . 2. Now , data embedding in remaining pixels of the block will take place using adaptive PVD-LSB replacement method as mentioned in section 2.3. Compute the absolute difference between first pixel 𝑝𝑖1and 𝑝𝑖2 ′ say, 𝑑𝑖 and the absolute difference between fourth pixel𝑝𝑖4 and 𝑝𝑖3 ′ say, 𝑑𝑖+1. 3. Assign the ranges corresponding to the differences found in Step 2 and obtain the lower bounds too i.e. 𝑙𝑖 and 𝑙𝑖+1 Accordingly, calculate 𝑡𝑖and 𝑡𝑖+1which denotes the number of bits to be concealed. 4. Read 𝑡𝑖and 𝑡𝑖+1 bits in continuation from the binary secret message and transform these bit- sequences into decimalvalues, say 𝑠𝑖and 𝑠𝑖+1 . Now, compute the new difference values using 𝑑𝑖 ′ = 𝑙𝑖 + 𝑠𝑖 𝑑𝑖+1 ′ = 𝑙𝑖+1 + 𝑠𝑖+1 (8) 5. Calculate the two new values of first and fourth pixel of a block using 𝑝𝑖1 ′′ = 𝑝𝑖2 ′ − 𝑑𝑖 ′ 𝑝𝑖1 ′′′ = 𝑝𝑖2 ′ + 𝑑𝑖 ′ 𝑝𝑖4 ′′ = 𝑝𝑖3 ′ − 𝑑𝑖+1 ′ 𝑝𝑖4 ′′′ = 𝑝𝑖3 ′ + 𝑑𝑖+! ′ (9) 6. Choose the best new value from step 5 using 𝑝𝑖1 ′ = 𝑝𝑖1 ′′ 𝑖𝑓 𝑝𝑖1 − 𝑝𝑖1 ′′ < 𝑝𝑖1 − 𝑝𝑖1 ′′′ 𝑎𝑛𝑑 0 ≤ 𝑝𝑖1 ′′ ≤ 255 𝑝𝑖1 ′′′ 𝑜𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒
  • 4. An improved adaptive steganographic method based on least significant bit substitution and pixel-.. DOI: 10.9790/4200-0701013843 www.iosrjournals.org 41 | Page 𝑝𝑖2 ′ = 𝑝𝑖2 ′′ 𝑖𝑓 𝑝𝑖2 − 𝑝𝑖2 ′′ < 𝑝𝑖2 − 𝑝𝑖2 ′′′ 𝑎𝑛𝑑 0 ≤ 𝑝𝑖2 ′′ ≤ 255 𝑝𝑖2 ′′′ 𝑜𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒 (10) Repeat the above procedure for every block of the cover image so as to obtain the final stego image. 3.3 Extracting phase In this part the secret data is obtained from the stego image. The stego image is partitioned into non- overlapping block of size 1x4 and then for the complete extraction of the secret message following steps are executed. 1. The data is extracted from the second and third pixel of the block first. Compute the difference between the two pixel values say 𝑑𝑖 ′ . If the difference lies in lower level of the range table then read three LSB bits from both pixels and concatenate the data bits and call it 𝑠𝑖𝑐 . 2. If the difference lies in the higher level then find out the difference between the lower bound of corresponding range and 𝑑𝑖 ′ , call it b. Find out t i.e. number of concealed bits and covert b into t number of bits. This string of bits is say, 𝑠𝑖𝑐 . 3. Calculate the absolute difference valuesbetween the 1st & 2nd pixel and 3rd &4th pixels of a block and find the range to which these difference values belong to. Then, obtain the lower bound 𝑙𝑖and 𝑙𝑖+1of the corresponding range and also determine the number of bits 𝑡𝑖and 𝑡𝑖+1to be extracted from each pixel. 4. Obtain the secret data sub-streams as 𝑠𝑖1and 𝑠𝑖2 by taking the difference between above calculated difference values and respective lower bounds. Transform 𝑠𝑖1and 𝑠𝑖2 to binary strings with length equivalent to𝑡𝑖and 𝑡𝑖+1. Finally, concatenate 𝑠𝑖𝑐 ,𝑠𝑖1and 𝑠𝑖2to obtain the original bit sequence of the secret message. IV. Experimental Results This section presents the experimental results of the proposed method. The test images used for verifying the results are greyscale images of size 512X512, namely „Lena‟, „Baboon‟, „Boat‟ and „Peppers‟. For the performance evaluation of any steganography method, the three main criteria can be used: (i) Capacity: Capacity is defined as the maximum amount of secret message that can be stored in a cover image [6]. (ii) Imperceptibility: It defines the similarity between the cover image and the stego image. The value of PSNR is used to define imperceptibility and is given by: 𝑀𝑆𝐸 = 1 𝑀×𝑁 2 1 1 ( ( , ) ( , )) M N i j I i j Y i j    (11) 𝑃𝑆𝑁𝑅 = 10𝑙𝑜𝑔10 𝑀𝑎𝑥 2 𝑀𝑆𝐸 (12) where MxN denotes the size of the cover image I and stego image Y. A high PSNR value means good quality of stego image whereas a low PSNR means the opposite[7] [8][9]. (iii) Robustness: Robustness is the property that provides the resistance against elimination of secret information from the stego image. It can be examined through steganalysis. Various steganalytic methods have been developed to detect the hidden message from the cover media [10][11][12][13]. Fig. 2 shows the changes are unobservable even after large data embedding in the cover image. Hence, the proposed method provides good image quality. Imperceptibility of the proposed method is governed by Table 1, which shows the good PSNR value in comparison to PVD-LSB method. Also, the embedding capacity is higher as compared to PVD-LSB method.The graph in Fig 3.shows the changes that occur in histogram due to data embedding [9]. It is clear from the fig. 3 that proposed method induces less uncompensated change in the histogram and therefore is more secure than PVD-LSB method.
  • 5. An improved adaptive steganographic method based on least significant bit substitution and pixel-.. DOI: 10.9790/4200-0701013843 www.iosrjournals.org 42 | Page (a) (b) Fig. 2. (a) standard cover images (b) stego images embedded with data using proposed method. Cover images Method Embedding capacity (bits) PSNR (db) Robustness Lena PVD-LSB 766,040 36.16 Less Proposed 777,255 36.5076 More Peppers PVD-LSB 770,248 35.34 Less Proposed 77,8591 35.2305 More Baboon PVD-LSB 717,848 32.63 Less Proposed 768,538 33.1523 More Boat PVD-LSB 756,768 33.62 Less Proposed 776,904 33.9226 More Table 1. Comparison of the results between PVD-LSB and proposed method.
  • 6. An improved adaptive steganographic method based on least significant bit substitution and pixel-.. DOI: 10.9790/4200-0701013843 www.iosrjournals.org 43 | Page Fig. 3. Uncompensated changes in histogram after embedding via proposed method and PVD- LSB method. V. Conclusions In this paper, a histogram preserving data hiding method is presented which is based on LSB substitution and PVD. This method can hide large amount of secret data as well as provide an imperceptible stego image quality while compensating for the dissimilarity between the histograms of the cover and stego images. This advantage of keeping the change in image histogram within permissible limit helps the proposed method to show better resistance against histogram based steganalysers. References [1]. F. Petitcolas, R. Anderson, M. Kuhn, “Information hiding - a survey”, Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078,1999. [2]. A.A.J. Altaay, S. bin Sahib, M. zamani, “An introduction to image steganography techniques,” Int. Conf. Advanced Computer Science Applications and Technologies, pp. 122-126, 2012. [3]. C.K.Chan, L.M. Cheng, “ Hiding data in image by simple LSB substitution”, pattern recognition, vol. 37, no. 3, pp. 469-474, 2004. [4]. M. Khodaei, K. Faez, “New adaptive steganographic method using least-significant- bit substitution and pixel value differencing,” IET Image Process.,vol.6, iss.6, pp. 677-686, 2012. [5]. H.C. Wu, N.I. Wu, C.S. Tsai, M.S. Hwang, “Image steganographic scheme based on pixel-value differencing and LSB replacement methods”, IEE Proc.Vis. Image SignalProcess., vol. 152, no. 5, pp. 611-615, 2005. [6]. C.M. Wang, N.I. Wu, C.S. Tsai, M.S. Hwang, “A high quality steganographic method with pixel- value differencing and modulus function”, The Journal of Systems and Software, vol.81,pp. 150-158, 2008. [7]. A.D.Kher, “Improved detection of LSBsteganography in grayscale images”, Lecture Notes in Computer Science, vol. 3200, pp. 583-592, 2005. [8]. J.Mielikainen, “LSB matching revisited”, IEEE Signal Process. Lett.,vol. 13, no. 5, pp. 285- 287, 2006. [9]. S. Sarreshtedari, M. A. Akhaee, “ One-third probability embedding: a new ±histogram Compensating image LSB steganography scheme”, IET Image Process., vol. 8, iss.2, pp. 78-89, 2014. [10]. N. Akhtar, P. Johri, S. Khan, “Enhancing the security and quality of LSB based image steganography,” 5th Int. Conf. Computational Intelligence and Communication Networks, pp. 385-390, 2013. [11]. A. Westfeld, A. Pfitzmann, “Attacks on Steganographic Systems,” Lecture Notes in Computer Science, Springer-Verlag, vol. 1768, pp. 61-75, 2000. [12]. J. Fridrich, M. Goljan, R. Du, “Reliable detection of LSB steganography in color and grayscale images”, Proc. ACM workshop on Multimedia and Security, pp.27-30, 2001. [13]. A.D. Kher, “Steganalysis of LSB Matching in grayscale images”, IEEE Signal Process. Lett., vol. 12,No. 6, pp. 441-444, 2005. [14]. R.C. Gonzalez, R.E. Woods, “Digital image processing”, Third edition, New Jersey,Pearson, 2011. [15]. J.C. Russ, “The image processing handbook”, Sixth Edition, USA, Taylor and Francis Group, 2011. [16]. Tel Aviv University, “ Image Database”, http://www.math.tau.ac.il/~turkel/image.html. [17]. The USC-SIPI Image Database,http://sipi.usc.edu/database. [18]. Amit bhanwala, Mayank kumar, yogendra Kumar,” FPGA based Design of Low Power Reconfigurable Router for Network on Chip (NoC)”, ISBN:978-1-4799-8890 ©2015 IEEE,International Conference on Computing, Communication and Automation (ICCCA2015), pp- 1320 - 1326, DOI: 10.1109/CCAA.2015.7148581. [19]. Mayank kumar, Kishore kumar, sanjiv kumar gupta, yogendra Kumar,” FPGA based Design of Area efficient router Architecture for Network on Chip (NoC)”, IEEE,International Conference on Computing, Communication and Automation (ICCCA2016), pp-1600 - 1605, DOI: 10.1109/CCAA.2016.7813980.