Steganography is the art of covered writing or hidden writing. The steganography can be done in six types of techniques, namely: substitution system technique, transform domain technique, spread spectrum technique, statistical method technique, distortion technique and cover generation technique. This ppt deals with substitution system technique and transforms domain technique. This ppt deals with four methods of steganography, namely: plain LSB steganography, inverted LSB steganography, pattern based steganography and twosided, threesided, foursided side matched methods
steganography. The performance and evaluation of these methods are shown in the ppt.
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
analysis on concealing information within non secret data
1. Analysis on Concealing Information
within Non-Secret Data
Author 2:
Rosepreet Kaur Bhogal
Asst. Professor (SECE)
Lovely Professional University,
Punjab
Author 1:
Vema Reddy Vanipenta
M.Tech (ECE)
Lovely Professional University,
Punjab
3. Table of Content
Steganography categories
Analyzed methods
Results & Discussions
Conclusion with Future Work
References
4. Steganography Categories
Steganography can be categorized into three categories
Steganography in image
Steganography in audio
Steganography in video
The image steganography techniques can be categorized into two
types
Spatial domain
Frequency domain
8. Technique 2: An Improved Inverted LSB
Steganography Method [1]
Cover Image
Select LSB of each
pixel in cover image
Message Image
Stego Image
First Scheme
Second Scheme
10. Technique 3: An Innovative Approach For Pattern
Based Image Steganography [2]
3/3/2017
Cover Image
Divide cover image into
25*25 blocks
Message Image Stego ImageEmbedding Process
Select z-pattern wise for
each block
Divide selected blocks
into 5*5 blocks
Select α-pattern wise for
each block
Select LSB of the selected
pixels in block
11. Technique 3: An Innovative Approach For Pattern
Based Image Steganography [2]
12. Technique 4: Steganography Using Two Sided, Three Sided, And
Four Sided Side Matched Methods [6]
3/3/20173/3/2017
Cover Image
Arrange the image in raster
scan order
Message
Image
Stego
Image
Embedding
Process
Select pixels according to
the 2-sided side matching
method
Select pixels according to
the 3-sided side matching
method
Select pixels according to
the 4-sided side matching
method
Message
Image
Stego
Image
Embedding
Process
Message
Image
Stego
Image
Embedding
Process
P
u
P
u
r
P
x
P
u
l
P
u
P
u
r
P
x
P
u
l
P
u
P
u
r
P
l
P
x
13. Technique 4: Steganography Using Two Sided, Three Sided, And
Four Sided Side Matched Methods [6]
40 42
45
d =
gu + gur
2
– gx
n = log2 d , if d > 1
d′ =
2n
+ 𝑏, 𝑖𝑓 𝑑 > 1;
−(2n
+ 𝑏), 𝑖𝑓 𝑑 < 1.
g′x =
gu + gur
2
– d′
d =
40 +42
2
– 45= -4
n = log2 −4 = ~2
b = (10)2 = 2
d′ = −(22 + 2)= -6
g′x =
40 + 42
2
– −6
= 41 + 6 = 47
Message image bits
1 0 1 1
14. Results & Discussions
The performance analyses of all the methods are calculated by using
PSNR and MSE equations.
PSNR= 10 log 10 (255/MSE)²
MSE= ∑∑ (Ic-Is)²/M*N
16. Technique 1: Plain LSB Steganography
Method
Cover
image
Stego image
of parrot
Stego image
of finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
17. Technique 2: An Improved Inverted LSB
Steganography Method
Cover
image
Stego image
of parrot
Stego image
of finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
18. Technique 3: An Innovative Approach For
Pattern Based Image Steganography
Cover
image
Stego image
of parrot
Stego image
of finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
19. Technique 4: Steganography using Two Sided Side
Matched Method
Cover
image
Stego image
of parrot
Stego image of
finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
20. Technique 4: Steganography using Three
Sided Side Matched Method
Cover
image
Stego image of
parrot
Stego image
of finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
21. Technique 4: Steganography using Four
Sided Side Matched Method
Cover
image
Stego image of
parrot
Stego image of
finger print
Stego image of
cameraman
Histogram
of cover
image
Histogram of
stego image
parrot
Histogram of
stego image
finger print
Histogram of
stego image
cameraman
22. Conclusion & Future Work
0
10
20
30
40
50
60
70
80
1 2 3 4 5 6 7 8 9
Plain LSB
Inverted LSB(First scheme)
Inverted LSB(Second
scheme)
Pattern Based
Two side
Three side
Four side
24. Conclusion & Future Work
In all these steganography methods we used different cover images for
hiding the secret data. By observing all these methods we get to know
that if we take cover image which is having same similarities as
message image. It will leads to lesser degradation in the stego image.
And also the cover image is used for carrier purpose only. So, we can
choose the cover image with respect to the message image.
25. References
1. Akhtar, N.; Khan, S.; Johre, P., “An improved inverted LSB steganography,” Issues and
Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference
on, DOI: 10. 1109/ICICICT. 20140 6781374, pp. 749-755, 2014.
2. Mani, M. Radhika; Lalithya, V.: Rekha, P. Swetha. , “An innovative approach for pattern
based image steganography,” Signal Processing, Informatics, Communication and
Energy Systems (SPICES), 2015 IEEE International Conference on, DOI: 10.
1109/SPICES. 2015. 7091380, pp. 1–4, 2015.
3. Shiva Kumar, K. B.; Raja, K. B.; Chhotaray, R.K.; Pattnaik, S., “Coherent steganography
using Segmentation and DCT,” Computational Intelligence and Computing Research
(ICCIC), 2010 IEEE International Conference on, DOI: 10.1109/ICCIC. 2010. 5705870,
pp. 1-6, 2010.
4. Prabhakaran, G.; Bhavani, R.; Sankaran, S., “Dual Wavelet used in Color Image
Steganography Method,” Intelligent Computing Applications (ICICA), 2014 International
Conference on, DOI: 10. 1109/ICICA. 2014. 49, pp. 193-197, 2014.
5. Goswami, S.; Goswami, J.; Mehra, R., “An efficient algorithm of steganography using
JPEG colored image,” Recent Advances and Innovations in Engineering (ICRAIE), 2014,
DOI: 10. 1109/ICRAIE. 2014. 6909254, pp. 1-5, 2014.
6. Gandharba, S.; Saroj Kumar, L. “Steganography using two sided, three sided, and four
sided side match methods,” in CSI Transactions on ICT (2013), DOI: 10. 1007/s40012-
013-0015-3, pp. 127-133, June 2013, Springer.
26. References
7. Al-Dmour, H.; Al-Ani, A.; Hung Nguyen, “An efficient steganography method for hiding
patient’s confidential information,” Engineering in Medicine and Biology Society (EMBC),
2014 36th Annual International Conference of the IEEE, DOI: 10. 1109/EMBC. 2014.
6943569, pp. 222-225, 2014.
8. Yi-zhen Chen ; Zhi Han ; Shu-ping Li ; Chun-hui Lu ; Xiao-Hui Yao, “An adaptive
steganography algorithm based on block sensitivity vectors using HVS features,” Image and
Signal Processing (CISP), 2010 3rd International Congress on, Vol. 3, DOI: 10. 1109/CISP.
2010. 5646724, pp. 1151-1155, 2010.
9. Mansour, Jamzad, Zahra Zahedi Kermani., “Secure Steganography Using Gabor Filter and
Neural Networks,” in Transactions on Data Hiding and Multimedia Security III, DOI: 10.
1007/978-3-540-69019-1_3, pp-33-49, 2008, Springer.
10. Eric Cole, “Hiding in Plain Sight: Steganography and the Art of Cover Communication,”
Wiley Publishing, Inc., Indianapolis, Indiana, 2003.
11. Ali Mohammad Al-Haj, “Advanced Techniques in Multimedia Watermarking: Image, Video
and Audio Applications,” Information Science Reference, 2010.
12. Gregory Kipper, “Investigator’s Guide to Steganography,”Auerbach Publications. 2004.
13. Michael Arnold, Martin Schmuker, Stephen D. Wolthusen, “Techniques and Applications of
Digital Watermarking and Content Protection,”Artech House, Inc, 2003.
27. References
14. Souvik Bhattacharyya and Gautam Sanyal, “Steganalysis of LSB Image
Steganography using Multiple Regression and Auto Regressive (AR) Model,”
International Journal Computer Technology Applications, Vol 2 (4), 1069-1077.
15. Ma, W.Y.: Texture features and learning similarity. University of California, Santa
Barbara (1996).
16. Manjunath, B.S.: Gabor wavelet transform and application to problems in early
vision. In: Proc.26th conference on signals, systems and computers, October 1992,
Pacific Grove, CA, pp. 796–800 (1992).
17. Principe, J.C., Euliano, N.R., Lefebvre, W.C.: Neural and Adaptive Systems:
Fundamentals Through Simulations. John Wiley and Sons, Chichester (2000).