SlideShare a Scribd company logo
1 of 29
Analysis on Concealing Information
within Non-Secret Data
Author 2:
Rosepreet Kaur Bhogal
Asst. Professor (SECE)
Lovely Professional University,
Punjab
Author 1:
Vema Reddy Vanipenta
M.Tech (ECE)
Lovely Professional University,
Punjab
Steganography
 Science of invisible communication
 Derived from the Greek word
Table of Content
 Steganography categories
 Analyzed methods
 Results & Discussions
 Conclusion with Future Work
 References
Steganography Categories
 Steganography can be categorized into three categories
 Steganography in image
 Steganography in audio
 Steganography in video
 The image steganography techniques can be categorized into two
types
 Spatial domain
 Frequency domain
Objective of Study
 Imperceptibility
 Reversibility
 Capacity
Technique 1: Plain LSB Steganography
Method [1]
Cover Image
Select LSB of each
pixel in cover image
Message Image
Stego Image
Embedding Process
Technique 1: Plain LSB Steganography
Method [1]
1 0 0 0 1 1 0 0
1 0 1 0 1 1 0 1
1 0 1 0 1 0 1 1
1 0 1 0 1 1 0 1
Cover image pixels
Message image bits
1 0 1 1
1 0 0 0 1 1 0 1
1 0 1 0 1 1 0 0
1 0 1 0 1 0 1 1
1 0 1 0 1 1 0 1
Stego image pixels
Technique 2: An Improved Inverted LSB
Steganography Method [1]
Cover Image
Select LSB of each
pixel in cover image
Message Image
Stego Image
First Scheme
Second Scheme
Technique 2: An Improved Inverted LSB
Steganography Method [1]
1 0 0 0 1 1 0 0
1 0 1 0 1 1 0 1
1 0 1 0 1 0 1 1
1 0 1 0 1 1 0 1
Message image bits
1 0 1 1
1 0 0 0 1 1 0 1
1 0 1 0 1 1 0 0
1 0 1 0 1 0 1 1
1 0 1 0 1 1 0 1
Cover image pixels Plain LSB
1 0 0 0 1 1 0 0
1 0 1 0 1 1 0 1
1 0 1 0 1 0 1 1
1 0 1 0 1 1 0 0
1 0 0 0 1 1 0 0
1 0 1 0 1 1 0 1
1 0 1 0 1 0 1 1
1 0 1 0 1 1 0 1
First Method Second Method
Technique 3: An Innovative Approach For Pattern
Based Image Steganography [2]
3/3/2017
Cover Image
Divide cover image into
25*25 blocks
Message Image Stego ImageEmbedding Process
Select z-pattern wise for
each block
Divide selected blocks
into 5*5 blocks
Select α-pattern wise for
each block
Select LSB of the selected
pixels in block
Technique 3: An Innovative Approach For Pattern
Based Image Steganography [2]
Technique 4: Steganography Using Two Sided, Three Sided, And
Four Sided Side Matched Methods [6]
3/3/20173/3/2017
Cover Image
Arrange the image in raster
scan order
Message
Image
Stego
Image
Embedding
Process
Select pixels according to
the 2-sided side matching
method
Select pixels according to
the 3-sided side matching
method
Select pixels according to
the 4-sided side matching
method
Message
Image
Stego
Image
Embedding
Process
Message
Image
Stego
Image
Embedding
Process
P
u
P
u
r
P
x
P
u
l
P
u
P
u
r
P
x
P
u
l
P
u
P
u
r
P
l
P
x
Technique 4: Steganography Using Two Sided, Three Sided, And
Four Sided Side Matched Methods [6]
40 42
45
d =
gu + gur
2
– gx
n = log2 d , if d > 1
d′ =
2n
+ 𝑏, 𝑖𝑓 𝑑 > 1;
−(2n
+ 𝑏), 𝑖𝑓 𝑑 < 1.
g′x =
gu + gur
2
– d′
d =
40 +42
2
– 45= -4
n = log2 −4 = ~2
b = (10)2 = 2
d′ = −(22 + 2)= -6
g′x =
40 + 42
2
– −6
= 41 + 6 = 47
Message image bits
1 0 1 1
Results & Discussions
 The performance analyses of all the methods are calculated by using
PSNR and MSE equations.
PSNR= 10 log 10 (255/MSE)²
MSE= ∑∑ (Ic-Is)²/M*N
Results & Discussions
Cover images
Message images
Technique 1: Plain LSB Steganography
Method
Cover
image
Stego image
of parrot
Stego image
of finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
Technique 2: An Improved Inverted LSB
Steganography Method
Cover
image
Stego image
of parrot
Stego image
of finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
Technique 3: An Innovative Approach For
Pattern Based Image Steganography
Cover
image
Stego image
of parrot
Stego image
of finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
Technique 4: Steganography using Two Sided Side
Matched Method
Cover
image
Stego image
of parrot
Stego image of
finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
Technique 4: Steganography using Three
Sided Side Matched Method
Cover
image
Stego image of
parrot
Stego image
of finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
Technique 4: Steganography using Four
Sided Side Matched Method
Cover
image
Stego image of
parrot
Stego image of
finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
Conclusion & Future Work
0
10
20
30
40
50
60
70
80
1 2 3 4 5 6 7 8 9
Plain LSB
Inverted LSB(First scheme)
Inverted LSB(Second
scheme)
Pattern Based
Two side
Three side
Four side
Conclusion & Future Work
0
1000
2000
3000
4000
5000
6000
7000
Conclusion & Future Work
 In all these steganography methods we used different cover images for
hiding the secret data. By observing all these methods we get to know
that if we take cover image which is having same similarities as
message image. It will leads to lesser degradation in the stego image.
And also the cover image is used for carrier purpose only. So, we can
choose the cover image with respect to the message image.
References
1. Akhtar, N.; Khan, S.; Johre, P., “An improved inverted LSB steganography,” Issues and
Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference
on, DOI: 10. 1109/ICICICT. 20140 6781374, pp. 749-755, 2014.
2. Mani, M. Radhika; Lalithya, V.: Rekha, P. Swetha. , “An innovative approach for pattern
based image steganography,” Signal Processing, Informatics, Communication and
Energy Systems (SPICES), 2015 IEEE International Conference on, DOI: 10.
1109/SPICES. 2015. 7091380, pp. 1–4, 2015.
3. Shiva Kumar, K. B.; Raja, K. B.; Chhotaray, R.K.; Pattnaik, S., “Coherent steganography
using Segmentation and DCT,” Computational Intelligence and Computing Research
(ICCIC), 2010 IEEE International Conference on, DOI: 10.1109/ICCIC. 2010. 5705870,
pp. 1-6, 2010.
4. Prabhakaran, G.; Bhavani, R.; Sankaran, S., “Dual Wavelet used in Color Image
Steganography Method,” Intelligent Computing Applications (ICICA), 2014 International
Conference on, DOI: 10. 1109/ICICA. 2014. 49, pp. 193-197, 2014.
5. Goswami, S.; Goswami, J.; Mehra, R., “An efficient algorithm of steganography using
JPEG colored image,” Recent Advances and Innovations in Engineering (ICRAIE), 2014,
DOI: 10. 1109/ICRAIE. 2014. 6909254, pp. 1-5, 2014.
6. Gandharba, S.; Saroj Kumar, L. “Steganography using two sided, three sided, and four
sided side match methods,” in CSI Transactions on ICT (2013), DOI: 10. 1007/s40012-
013-0015-3, pp. 127-133, June 2013, Springer.
References
7. Al-Dmour, H.; Al-Ani, A.; Hung Nguyen, “An efficient steganography method for hiding
patient’s confidential information,” Engineering in Medicine and Biology Society (EMBC),
2014 36th Annual International Conference of the IEEE, DOI: 10. 1109/EMBC. 2014.
6943569, pp. 222-225, 2014.
8. Yi-zhen Chen ; Zhi Han ; Shu-ping Li ; Chun-hui Lu ; Xiao-Hui Yao, “An adaptive
steganography algorithm based on block sensitivity vectors using HVS features,” Image and
Signal Processing (CISP), 2010 3rd International Congress on, Vol. 3, DOI: 10. 1109/CISP.
2010. 5646724, pp. 1151-1155, 2010.
9. Mansour, Jamzad, Zahra Zahedi Kermani., “Secure Steganography Using Gabor Filter and
Neural Networks,” in Transactions on Data Hiding and Multimedia Security III, DOI: 10.
1007/978-3-540-69019-1_3, pp-33-49, 2008, Springer.
10. Eric Cole, “Hiding in Plain Sight: Steganography and the Art of Cover Communication,”
Wiley Publishing, Inc., Indianapolis, Indiana, 2003.
11. Ali Mohammad Al-Haj, “Advanced Techniques in Multimedia Watermarking: Image, Video
and Audio Applications,” Information Science Reference, 2010.
12. Gregory Kipper, “Investigator’s Guide to Steganography,”Auerbach Publications. 2004.
13. Michael Arnold, Martin Schmuker, Stephen D. Wolthusen, “Techniques and Applications of
Digital Watermarking and Content Protection,”Artech House, Inc, 2003.
References
14. Souvik Bhattacharyya and Gautam Sanyal, “Steganalysis of LSB Image
Steganography using Multiple Regression and Auto Regressive (AR) Model,”
International Journal Computer Technology Applications, Vol 2 (4), 1069-1077.
15. Ma, W.Y.: Texture features and learning similarity. University of California, Santa
Barbara (1996).
16. Manjunath, B.S.: Gabor wavelet transform and application to problems in early
vision. In: Proc.26th conference on signals, systems and computers, October 1992,
Pacific Grove, CA, pp. 796–800 (1992).
17. Principe, J.C., Euliano, N.R., Lefebvre, W.C.: Neural and Adaptive Systems:
Fundamentals Through Simulations. John Wiley and Sons, Chichester (2000).
Concealing Information
within Non-Secret Data
Thank you…..

More Related Content

What's hot

Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityIDES Editor
 
Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security byIJNSA Journal
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniquestheijes
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
 

What's hot (18)

Image steganography
Image steganographyImage steganography
Image steganography
 
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced SecurityGenetic Algorithm based Mosaic Image Steganography for Enhanced Security
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security by
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
L026070074
L026070074L026070074
L026070074
 
Steganography
SteganographySteganography
Steganography
 
A Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography TechniquesA Comparitive Analysis Of Steganography Techniques
A Comparitive Analysis Of Steganography Techniques
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
K0815660
K0815660K0815660
K0815660
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 

Viewers also liked

Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationLaili Aidi
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Alberto Villegas
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 

Viewers also liked (8)

Steganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - PresentationSteganography Tool & Steganography Detection Tool - Presentation
Steganography Tool & Steganography Detection Tool - Presentation
 
Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.Steganography: Hiding information in past, present and future.
Steganography: Hiding information in past, present and future.
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
Steganography Steganography
Steganography
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 

Similar to analysis on concealing information within non secret data

A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method IJECEIAES
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyAly Arman
 
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Rajesh Kumar
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IJNSA Journal
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image SteganographyNathan Mathis
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
 

Similar to analysis on concealing information within non secret data (20)

A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
A secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-keyA secured-rgb-image-steganography-using-secret-key
A secured-rgb-image-steganography-using-secret-key
 
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
Image Steganography: An Inevitable Need for Data Security, Authors: Sneh Rach...
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

analysis on concealing information within non secret data

  • 1. Analysis on Concealing Information within Non-Secret Data Author 2: Rosepreet Kaur Bhogal Asst. Professor (SECE) Lovely Professional University, Punjab Author 1: Vema Reddy Vanipenta M.Tech (ECE) Lovely Professional University, Punjab
  • 2. Steganography  Science of invisible communication  Derived from the Greek word
  • 3. Table of Content  Steganography categories  Analyzed methods  Results & Discussions  Conclusion with Future Work  References
  • 4. Steganography Categories  Steganography can be categorized into three categories  Steganography in image  Steganography in audio  Steganography in video  The image steganography techniques can be categorized into two types  Spatial domain  Frequency domain
  • 5. Objective of Study  Imperceptibility  Reversibility  Capacity
  • 6. Technique 1: Plain LSB Steganography Method [1] Cover Image Select LSB of each pixel in cover image Message Image Stego Image Embedding Process
  • 7. Technique 1: Plain LSB Steganography Method [1] 1 0 0 0 1 1 0 0 1 0 1 0 1 1 0 1 1 0 1 0 1 0 1 1 1 0 1 0 1 1 0 1 Cover image pixels Message image bits 1 0 1 1 1 0 0 0 1 1 0 1 1 0 1 0 1 1 0 0 1 0 1 0 1 0 1 1 1 0 1 0 1 1 0 1 Stego image pixels
  • 8. Technique 2: An Improved Inverted LSB Steganography Method [1] Cover Image Select LSB of each pixel in cover image Message Image Stego Image First Scheme Second Scheme
  • 9. Technique 2: An Improved Inverted LSB Steganography Method [1] 1 0 0 0 1 1 0 0 1 0 1 0 1 1 0 1 1 0 1 0 1 0 1 1 1 0 1 0 1 1 0 1 Message image bits 1 0 1 1 1 0 0 0 1 1 0 1 1 0 1 0 1 1 0 0 1 0 1 0 1 0 1 1 1 0 1 0 1 1 0 1 Cover image pixels Plain LSB 1 0 0 0 1 1 0 0 1 0 1 0 1 1 0 1 1 0 1 0 1 0 1 1 1 0 1 0 1 1 0 0 1 0 0 0 1 1 0 0 1 0 1 0 1 1 0 1 1 0 1 0 1 0 1 1 1 0 1 0 1 1 0 1 First Method Second Method
  • 10. Technique 3: An Innovative Approach For Pattern Based Image Steganography [2] 3/3/2017 Cover Image Divide cover image into 25*25 blocks Message Image Stego ImageEmbedding Process Select z-pattern wise for each block Divide selected blocks into 5*5 blocks Select α-pattern wise for each block Select LSB of the selected pixels in block
  • 11. Technique 3: An Innovative Approach For Pattern Based Image Steganography [2]
  • 12. Technique 4: Steganography Using Two Sided, Three Sided, And Four Sided Side Matched Methods [6] 3/3/20173/3/2017 Cover Image Arrange the image in raster scan order Message Image Stego Image Embedding Process Select pixels according to the 2-sided side matching method Select pixels according to the 3-sided side matching method Select pixels according to the 4-sided side matching method Message Image Stego Image Embedding Process Message Image Stego Image Embedding Process P u P u r P x P u l P u P u r P x P u l P u P u r P l P x
  • 13. Technique 4: Steganography Using Two Sided, Three Sided, And Four Sided Side Matched Methods [6] 40 42 45 d = gu + gur 2 – gx n = log2 d , if d > 1 d′ = 2n + 𝑏, 𝑖𝑓 𝑑 > 1; −(2n + 𝑏), 𝑖𝑓 𝑑 < 1. g′x = gu + gur 2 – d′ d = 40 +42 2 – 45= -4 n = log2 −4 = ~2 b = (10)2 = 2 d′ = −(22 + 2)= -6 g′x = 40 + 42 2 – −6 = 41 + 6 = 47 Message image bits 1 0 1 1
  • 14. Results & Discussions  The performance analyses of all the methods are calculated by using PSNR and MSE equations. PSNR= 10 log 10 (255/MSE)² MSE= ∑∑ (Ic-Is)²/M*N
  • 15. Results & Discussions Cover images Message images
  • 16. Technique 1: Plain LSB Steganography Method Cover image Stego image of parrot Stego image of finger print Stego image of cameraman Histogram of cover image Histogram of stego image parrot Histogram of stego image finger print Histogram of stego image cameraman
  • 17. Technique 2: An Improved Inverted LSB Steganography Method Cover image Stego image of parrot Stego image of finger print Stego image of cameraman Histogram of cover image Histogram of stego image parrot Histogram of stego image finger print Histogram of stego image cameraman
  • 18. Technique 3: An Innovative Approach For Pattern Based Image Steganography Cover image Stego image of parrot Stego image of finger print Stego image of cameraman Histogram of cover image Histogram of stego image parrot Histogram of stego image finger print Histogram of stego image cameraman
  • 19. Technique 4: Steganography using Two Sided Side Matched Method Cover image Stego image of parrot Stego image of finger print Stego image of cameraman Histogram of cover image Histogram of stego image parrot Histogram of stego image finger print Histogram of stego image cameraman
  • 20. Technique 4: Steganography using Three Sided Side Matched Method Cover image Stego image of parrot Stego image of finger print Stego image of cameraman Histogram of cover image Histogram of stego image parrot Histogram of stego image finger print Histogram of stego image cameraman
  • 21. Technique 4: Steganography using Four Sided Side Matched Method Cover image Stego image of parrot Stego image of finger print Stego image of cameraman Histogram of cover image Histogram of stego image parrot Histogram of stego image finger print Histogram of stego image cameraman
  • 22. Conclusion & Future Work 0 10 20 30 40 50 60 70 80 1 2 3 4 5 6 7 8 9 Plain LSB Inverted LSB(First scheme) Inverted LSB(Second scheme) Pattern Based Two side Three side Four side
  • 23. Conclusion & Future Work 0 1000 2000 3000 4000 5000 6000 7000
  • 24. Conclusion & Future Work  In all these steganography methods we used different cover images for hiding the secret data. By observing all these methods we get to know that if we take cover image which is having same similarities as message image. It will leads to lesser degradation in the stego image. And also the cover image is used for carrier purpose only. So, we can choose the cover image with respect to the message image.
  • 25. References 1. Akhtar, N.; Khan, S.; Johre, P., “An improved inverted LSB steganography,” Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on, DOI: 10. 1109/ICICICT. 20140 6781374, pp. 749-755, 2014. 2. Mani, M. Radhika; Lalithya, V.: Rekha, P. Swetha. , “An innovative approach for pattern based image steganography,” Signal Processing, Informatics, Communication and Energy Systems (SPICES), 2015 IEEE International Conference on, DOI: 10. 1109/SPICES. 2015. 7091380, pp. 1–4, 2015. 3. Shiva Kumar, K. B.; Raja, K. B.; Chhotaray, R.K.; Pattnaik, S., “Coherent steganography using Segmentation and DCT,” Computational Intelligence and Computing Research (ICCIC), 2010 IEEE International Conference on, DOI: 10.1109/ICCIC. 2010. 5705870, pp. 1-6, 2010. 4. Prabhakaran, G.; Bhavani, R.; Sankaran, S., “Dual Wavelet used in Color Image Steganography Method,” Intelligent Computing Applications (ICICA), 2014 International Conference on, DOI: 10. 1109/ICICA. 2014. 49, pp. 193-197, 2014. 5. Goswami, S.; Goswami, J.; Mehra, R., “An efficient algorithm of steganography using JPEG colored image,” Recent Advances and Innovations in Engineering (ICRAIE), 2014, DOI: 10. 1109/ICRAIE. 2014. 6909254, pp. 1-5, 2014. 6. Gandharba, S.; Saroj Kumar, L. “Steganography using two sided, three sided, and four sided side match methods,” in CSI Transactions on ICT (2013), DOI: 10. 1007/s40012- 013-0015-3, pp. 127-133, June 2013, Springer.
  • 26. References 7. Al-Dmour, H.; Al-Ani, A.; Hung Nguyen, “An efficient steganography method for hiding patient’s confidential information,” Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE, DOI: 10. 1109/EMBC. 2014. 6943569, pp. 222-225, 2014. 8. Yi-zhen Chen ; Zhi Han ; Shu-ping Li ; Chun-hui Lu ; Xiao-Hui Yao, “An adaptive steganography algorithm based on block sensitivity vectors using HVS features,” Image and Signal Processing (CISP), 2010 3rd International Congress on, Vol. 3, DOI: 10. 1109/CISP. 2010. 5646724, pp. 1151-1155, 2010. 9. Mansour, Jamzad, Zahra Zahedi Kermani., “Secure Steganography Using Gabor Filter and Neural Networks,” in Transactions on Data Hiding and Multimedia Security III, DOI: 10. 1007/978-3-540-69019-1_3, pp-33-49, 2008, Springer. 10. Eric Cole, “Hiding in Plain Sight: Steganography and the Art of Cover Communication,” Wiley Publishing, Inc., Indianapolis, Indiana, 2003. 11. Ali Mohammad Al-Haj, “Advanced Techniques in Multimedia Watermarking: Image, Video and Audio Applications,” Information Science Reference, 2010. 12. Gregory Kipper, “Investigator’s Guide to Steganography,”Auerbach Publications. 2004. 13. Michael Arnold, Martin Schmuker, Stephen D. Wolthusen, “Techniques and Applications of Digital Watermarking and Content Protection,”Artech House, Inc, 2003.
  • 27. References 14. Souvik Bhattacharyya and Gautam Sanyal, “Steganalysis of LSB Image Steganography using Multiple Regression and Auto Regressive (AR) Model,” International Journal Computer Technology Applications, Vol 2 (4), 1069-1077. 15. Ma, W.Y.: Texture features and learning similarity. University of California, Santa Barbara (1996). 16. Manjunath, B.S.: Gabor wavelet transform and application to problems in early vision. In: Proc.26th conference on signals, systems and computers, October 1992, Pacific Grove, CA, pp. 796–800 (1992). 17. Principe, J.C., Euliano, N.R., Lefebvre, W.C.: Neural and Adaptive Systems: Fundamentals Through Simulations. John Wiley and Sons, Chichester (2000).