SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 36-40
www.iosrjournals.org
www.iosrjournals.org 36 | Page
Efficient Technique for Image Stenography Based on coordinates
of pixels
S.Thenmozhli1
, Dr.M.Chandra sekaran2
1
(Research Scholar, Anna / Anna University, Chennai)
2
(HOD ECE , GCE / Anna University Name,Salem)
Abstract : A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment
is proposed. The proposed method is the extension of the diamond encoding embedding scheme. First, choosing
the cropped region from given cover image select 4 pixel pairs from cropped region, and one secret k-ary digit
is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit
and it can be obtained by adjusting pixel values in a block. Here embedding parameter k, and the block
capacity is equal to log2(2k2 + 2k + 1). The diamond encoding provides an easy way to produce a more
perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret
data can be extracted without disturbing the original cover image. Experimental results have demonstrated that
the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation
imperceptible.
Keywords – stegnography,pixel pair matching,lsb
I. INTRODUCTION
STEGANOGRAPHY is the art of hiding secret information in the form of cover which can be image
complex audio, video or any sophisticated biometrics formats Clearly, the goal of cryptography is to protect the
content of messages , steganography is to hide the existence of messages. An advantage of steganography is that
it can be employed to secretly transmit messages without the fact of the transmission being discovered.
Generically, the steganography process is classified into two phases in majority of the prior research work e.g.
message embedding and extraction. In the embedding operation, a secret message is transformed into a bit
stream of bits; this is embedded into the least significant bits (LSBs) of the image pixels. The embedding
overwrites the pixel LSB with the message bit if the pixel LSB and message bit do not match. Otherwise, no
changes are necessary. For the extraction operation, message bits are retrieved from pixel LSBs and combined
to form the secret message.
There are two main selection algorithms that can be employed to embed secret message bits:
sequential and random. For sequential selection, the locations of pixels used for embedding are selected
sequentially one after another. For instance, pixels are selected from left to right and top to bottom until all
message bits are embedded. With random selection, the locations of the pixels used for embedding are permuted
and distributed over the whole image. The distribution of the message bits is controlled by a pseudorandom
number generator whose seed is a secret shared by the sender and the receiver. This seed is also called the stego-
key. The latter selection method provides better security than the former because random selection scatters the
image distortion over the whole image, which makes it less perceptible.
II. PROPOSED METHOD
2.1 k ary notational matrix :
The proposed method is the extension of the exploiting embedding scheme is the main idea of
embedding scheme is that each (2n + 1)- k ary notational secret digit is carried by n cover pixels, and only one
pixel value increases or decreases by 1 at most. For each block of n cover pixels, there are 2n possible states of
only one pixel value plus 1 or minus 1.
The 2n states of alteration plus the case in which no pixel is modified form (2n + 1) different cases.
Therefore, the (2n + 1)- k ary notational secret digit is embedded into the cover pixels by changing the state.
Before the data embedding procedure, the preprocess can convert the secret data into sequences of digits with
(2n + 1)-k ary notational representation.
For the simplest case of n = 2, the secret data stream S(2) can be expressed as S(5) where S(d) denotes the
d-ary notational system representation of secret data stream S. Thus, the 5-ary digits can conceal into blocks of
two cover pixels by modifying at most one pixel value. Denote the gray values of a block of two cover pixels as
p1 and p2, and the extraction function f is deepened as a weighted sum modulo 5:
Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 37 | Page
Suppose that the transformed 5-ary secret digit s desired to be embedded into the cover pixels p1 and p2.
According to the secret digit, the embedding process can be classified into 5 conditions.
Condition 1. If (s − f (p1, p2)) mod 5 = 0:
No modification is needed because the extraction function f can decrypt the correct secret data.
Condition 2. If (s − f (p1, p2)) mod 5 = 1: Increase the pixel value p1 by 1.
Condition 3. If (s − f (p1, p2)) mod 5 = 2: Increase the pixel value p2 by 1.
Diamond encoding patterns with k = 1 and (b) diamond encoding patterns with k = 2.
Condition 4. If (s − f (p1, p2)) mod 5 = 3 Decrease the pixel value p2 by 1.
Condition 5. If (s − f (p1, p2)) mod 5 = 4: Decrease the pixel value p1 by 1.
Compute the two pixel values x and y by
f( x,y ) = ( (2k + 1) * x + y) mod l ---------- 1
The new stego-image pixel pair can be calculated by replacing f (x, y) with st . The used equation is shown as
follows:
dt = st − f (x,y) mod l. ----------- 2
st - embedded secretdigit st is obtained from the t th index of the sequence of lary mdigits.
2.2 Block Diagram :
2.2.1 Embedding Call back
Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 38 | Page
2.2.2 Extracting Callback
III. INDENTATIONS AND EQUATIONS
In this section, we shall introduce the general operation of the diamond encoding technique. The
proposed scheme embeds (2n + 1)- ary digit into n cover pixels, but the diamond encoding scheme can conceal
(2k2 + 2k + 1)- ary digit into a cover pixel pair where k is the embedding parameter. The detail of this scheme is
described as follows. Assume that a, b, p, and q are pixel values, and k is a positive integer. The neighborhood
set Sk(p, q) represents the set that contains all the vectors (a, b) with the distance to vector (p, q) smaller than
k, and Sk(p, q) is defined as the following form:
sk (p,q) = { (a,b) (p - q) + (q - b) <= k }; -------- 3
sk =number of elements of the set Sk, and each member in Sk is called neighboring vector of (p, q). the
following equations are used to be found sk
Sk = + ----------- 4
=
= 1 + ((k(k+1))) / 2 * 4 ;
= 1 + 2k(k+1);
= 2k2
+ 2k + 1;
For extraction we are using the following formula:
F (p’,q’) = _(2k + 1) × p’ + q’ mod l ------- 5
Here (p’ , q’) = coordinates of extracted pixel pairs
l = 2k2 +2k +1. ------------- 6
Here is an example to describe how the proposed algorithm actually works. Assume that the
embedding parameter k = 2 and l = 13. Suppose we have pixel pairs x = 20 and y = 31 and we use (4) to
calculate DCV by computing f (20, 31) = (20 × 5 + 31)mod13 = 1. Now let us take st = 11(13) as the embedded
secret digit, and we can obtain the modulus distance dt = 11−1mod 13 = 10 by computing Then, we search
D2(20, 31) which is shown in Figure 2 and obtain the neighboring vector (22, 31) locating in set S2(20, 31) and
dk = 10. Therefore, the values of pixel pair (20, 31) are replaced with (22, 31).
In the secret data extraction phase, the stego-pixel pairs x_ = 22 and y_ = 31 can be used to
compute the DCV by f (22, 31) = 22 × 5 + 28mod13 = 11. Finally, the secret digit st is obtained.
Stego image pixel
pair
Neighbour matrix
Modulus distance calculate
Secret Data
Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 39 | Page
IV. FIGURES AND TABLES
4 .1 Resulting Images
In this paper five cover images Lena, Zelda, of 128×128 pixels as shown in the figure 4. 1a, 1b, 2 a,2b
are considered. Then to evaluate the performance of the proposed method, several experiments have been
carried by considering for secret text . The results of above algorithm have been shown below
Fig (1 a) input image Fig (2 a) input image
Fig (1 b) stego image Fig (2 b) stego image
In our experiments, the quality of the stego-image is measured by the peak signal-to-noise ratio
(PSNR). The PSNR is the most popular metris to measure the distortion between the cover image and stego-
image. It is defined as follows:
PSNR = 10 log 10 (255 *255 / MSE)
MSE = (1/ M X N) (I/p img – O/p img)^2
4.4 Table Comparison :
Smaller k means low capacity and less distortion whereas larger k means high capacity and increased
distortion. As expected, Table 1 shows that the growth of payload did depend on the value k. The third column
of Table 1 indicates that the numbers of pixels payload is nothing but no of bits to be embedded in an cover
image Results of the proposed scheme with different parameter k
Table 1
K value Sk Payload Psnr
1 1.16 52
2 13 1.85 49
3 25 2.32 47
4 41 2.68 42
V. CONCLUSION
In this paper, we have presented a novel data hiding scheme based on the pixel pair matching
technique. The diamond encoding method has been used to alleviate distortions after hiding a secret digit into
two cover pixels. It not only keeps high stego-image quality but also considering large amount of data into cover
Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 40 | Page
images for secret communication. The performance of the proposed method proves to be better than the simple
and modify LSB method and other existing schemes in terms of payload and stego-image quality.
Acknowledgements
This research project would not have been possible without the support of many people. The author
wishes to express her gratitude to her supervisor, Prof. Dr . Chandra sekaran HOD / ECE Government Collgege
of engg Salem who was abundantly helpful and offered invaluable assistance, support and guidance
REFERENCES
[1] S.-H. Wang and Y.-P. Lin, ―Wavelet tree quantization for copyright protection watermarking,‖ IEEE Transactions on Image
Processing, vol. 13, no. 2, pp. 154–165, 2004.
[2] D.-C. Lou and J.-L. Liu, ―Steganographic method for secure communications,‖ Computers and Security, vol. 21, no. 5, pp. 449–
460, 2002.
[3] P. L. Lin, C.-K. Hsieh, and P.-W. Huang, ―A hierarchical digital watermarking method for image tamper detection and recovery,‖
Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, 2005.
[4] P. W. Wong and N. Memon, ―Secret and public key image watermarking schemes for image authentication and
ownershipverification,‖ IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001.
[5] C.-K. Chan and L. M. Cheng, ―Hiding data in images by simple LSB substitution,‖ Pattern Recognition, vol. 37, no. 3,pp. 469–474,
2004.
[6] Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, ―A secure data hiding scheme for binary images,‖ IEEE Transactions onCommunications,
vol. 50, no. 8, pp. 1227–1231, 2002.
[7] A.Westfeld, ―F5—a steganographic algorithm,‖ in Proceedings of the 4th International Workshop on Information Hiding(IH ’01),
vol. 2137 of Lecture Notes in Computer Science, pp. 289–302, Pittsburgh, Pa, USA, April 2001.

More Related Content

What's hot

Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
mourya chandra
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
CSCJournals
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Data scientist training in bangalore
Data scientist training in bangaloreData scientist training in bangalore
Data scientist training in bangalore
prathyusha1234
 

What's hot (7)

Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
2-D array
2-D array2-D array
2-D array
 
Pixelrelationships
PixelrelationshipsPixelrelationships
Pixelrelationships
 
11 clusadvanced
11 clusadvanced11 clusadvanced
11 clusadvanced
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Data scientist training in bangalore
Data scientist training in bangaloreData scientist training in bangalore
Data scientist training in bangalore
 

Viewers also liked

H0934549
H0934549H0934549
H0934549
IOSR Journals
 
The juggler's brain final
The juggler's brain finalThe juggler's brain final
The juggler's brain final
George Haydock
 
Web log evaluation
Web log evaluationWeb log evaluation
Web log evaluationTemibaybee
 
audition
auditionaudition
audition
supernovaqp
 
Two household items
Two household itemsTwo household items
Two household itemsmharish9
 
How to Create an Effective Imagefest Slideshow
How to Create an Effective Imagefest SlideshowHow to Create an Effective Imagefest Slideshow
How to Create an Effective Imagefest Slideshow
comoxvalleycameraclub
 
лицей пушкина
лицей пушкиналицей пушкина
лицей пушкина
Natalya Dyrda
 
Ficointerviewquestionsandanswers
FicointerviewquestionsandanswersFicointerviewquestionsandanswers
Ficointerviewquestionsandanswers
Satyaranjan Swain
 
K0347480 copy
K0347480   copyK0347480   copy
K0347480 copy
IOSR Journals
 
D0532025
D0532025D0532025
D0532025
IOSR Journals
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина Земли
Natalya Dyrda
 
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...IOSR Journals
 
Libro de rosa maria
Libro de rosa mariaLibro de rosa maria
Libro de rosa marialuisariza16
 
Trashing Utopia 2015
Trashing Utopia   2015 Trashing Utopia   2015
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
IOSR Journals
 
тестфонетика9 класса
тестфонетика9 классатестфонетика9 класса
тестфонетика9 классаNatalya Dyrda
 

Viewers also liked (19)

H0934549
H0934549H0934549
H0934549
 
The juggler's brain final
The juggler's brain finalThe juggler's brain final
The juggler's brain final
 
Web log evaluation
Web log evaluationWeb log evaluation
Web log evaluation
 
audition
auditionaudition
audition
 
Two household items
Two household itemsTwo household items
Two household items
 
How to Create an Effective Imagefest Slideshow
How to Create an Effective Imagefest SlideshowHow to Create an Effective Imagefest Slideshow
How to Create an Effective Imagefest Slideshow
 
лицей пушкина
лицей пушкиналицей пушкина
лицей пушкина
 
Ficointerviewquestionsandanswers
FicointerviewquestionsandanswersFicointerviewquestionsandanswers
Ficointerviewquestionsandanswers
 
K0347480 copy
K0347480   copyK0347480   copy
K0347480 copy
 
I0925259
I0925259I0925259
I0925259
 
D0532025
D0532025D0532025
D0532025
 
C0931115
C0931115C0931115
C0931115
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина Земли
 
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
 
I0445159
I0445159I0445159
I0445159
 
Libro de rosa maria
Libro de rosa mariaLibro de rosa maria
Libro de rosa maria
 
Trashing Utopia 2015
Trashing Utopia   2015 Trashing Utopia   2015
Trashing Utopia 2015
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
 
тестфонетика9 класса
тестфонетика9 классатестфонетика9 класса
тестфонетика9 класса
 

Similar to Efficient Technique for Image Stenography Based on coordinates of pixels

Is3314841490
Is3314841490Is3314841490
Is3314841490
IJERA Editor
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
ijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
ijistjournal
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
csandit
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
cscpconf
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
Editor IJMTER
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Editor IJCATR
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
CSCJournals
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
ijistjournal
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
ijistjournal
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
cscpconf
 
C010231217
C010231217C010231217
C010231217
IOSR Journals
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
IJNSA Journal
 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
Ali Broumandnia
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
IAESIJEECS
 

Similar to Efficient Technique for Image Stenography Based on coordinates of pixels (20)

Is3314841490
Is3314841490Is3314841490
Is3314841490
 
E0152531
E0152531E0152531
E0152531
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Bt32444450
Bt32444450Bt32444450
Bt32444450
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
C010231217
C010231217C010231217
C010231217
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Ethernet Routing and switching chapter 1.ppt
Ethernet Routing and switching chapter 1.pptEthernet Routing and switching chapter 1.ppt
Ethernet Routing and switching chapter 1.ppt
azkamurat
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 

Recently uploaded (20)

ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Ethernet Routing and switching chapter 1.ppt
Ethernet Routing and switching chapter 1.pptEthernet Routing and switching chapter 1.ppt
Ethernet Routing and switching chapter 1.ppt
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 

Efficient Technique for Image Stenography Based on coordinates of pixels

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 36-40 www.iosrjournals.org www.iosrjournals.org 36 | Page Efficient Technique for Image Stenography Based on coordinates of pixels S.Thenmozhli1 , Dr.M.Chandra sekaran2 1 (Research Scholar, Anna / Anna University, Chennai) 2 (HOD ECE , GCE / Anna University Name,Salem) Abstract : A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the diamond encoding embedding scheme. First, choosing the cropped region from given cover image select 4 pixel pairs from cropped region, and one secret k-ary digit is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit and it can be obtained by adjusting pixel values in a block. Here embedding parameter k, and the block capacity is equal to log2(2k2 + 2k + 1). The diamond encoding provides an easy way to produce a more perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret data can be extracted without disturbing the original cover image. Experimental results have demonstrated that the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible. Keywords – stegnography,pixel pair matching,lsb I. INTRODUCTION STEGANOGRAPHY is the art of hiding secret information in the form of cover which can be image complex audio, video or any sophisticated biometrics formats Clearly, the goal of cryptography is to protect the content of messages , steganography is to hide the existence of messages. An advantage of steganography is that it can be employed to secretly transmit messages without the fact of the transmission being discovered. Generically, the steganography process is classified into two phases in majority of the prior research work e.g. message embedding and extraction. In the embedding operation, a secret message is transformed into a bit stream of bits; this is embedded into the least significant bits (LSBs) of the image pixels. The embedding overwrites the pixel LSB with the message bit if the pixel LSB and message bit do not match. Otherwise, no changes are necessary. For the extraction operation, message bits are retrieved from pixel LSBs and combined to form the secret message. There are two main selection algorithms that can be employed to embed secret message bits: sequential and random. For sequential selection, the locations of pixels used for embedding are selected sequentially one after another. For instance, pixels are selected from left to right and top to bottom until all message bits are embedded. With random selection, the locations of the pixels used for embedding are permuted and distributed over the whole image. The distribution of the message bits is controlled by a pseudorandom number generator whose seed is a secret shared by the sender and the receiver. This seed is also called the stego- key. The latter selection method provides better security than the former because random selection scatters the image distortion over the whole image, which makes it less perceptible. II. PROPOSED METHOD 2.1 k ary notational matrix : The proposed method is the extension of the exploiting embedding scheme is the main idea of embedding scheme is that each (2n + 1)- k ary notational secret digit is carried by n cover pixels, and only one pixel value increases or decreases by 1 at most. For each block of n cover pixels, there are 2n possible states of only one pixel value plus 1 or minus 1. The 2n states of alteration plus the case in which no pixel is modified form (2n + 1) different cases. Therefore, the (2n + 1)- k ary notational secret digit is embedded into the cover pixels by changing the state. Before the data embedding procedure, the preprocess can convert the secret data into sequences of digits with (2n + 1)-k ary notational representation. For the simplest case of n = 2, the secret data stream S(2) can be expressed as S(5) where S(d) denotes the d-ary notational system representation of secret data stream S. Thus, the 5-ary digits can conceal into blocks of two cover pixels by modifying at most one pixel value. Denote the gray values of a block of two cover pixels as p1 and p2, and the extraction function f is deepened as a weighted sum modulo 5:
  • 2. Efficient Technique for Image Stenography Based on coordinates of pixels www.iosrjournals.org 37 | Page Suppose that the transformed 5-ary secret digit s desired to be embedded into the cover pixels p1 and p2. According to the secret digit, the embedding process can be classified into 5 conditions. Condition 1. If (s − f (p1, p2)) mod 5 = 0: No modification is needed because the extraction function f can decrypt the correct secret data. Condition 2. If (s − f (p1, p2)) mod 5 = 1: Increase the pixel value p1 by 1. Condition 3. If (s − f (p1, p2)) mod 5 = 2: Increase the pixel value p2 by 1. Diamond encoding patterns with k = 1 and (b) diamond encoding patterns with k = 2. Condition 4. If (s − f (p1, p2)) mod 5 = 3 Decrease the pixel value p2 by 1. Condition 5. If (s − f (p1, p2)) mod 5 = 4: Decrease the pixel value p1 by 1. Compute the two pixel values x and y by f( x,y ) = ( (2k + 1) * x + y) mod l ---------- 1 The new stego-image pixel pair can be calculated by replacing f (x, y) with st . The used equation is shown as follows: dt = st − f (x,y) mod l. ----------- 2 st - embedded secretdigit st is obtained from the t th index of the sequence of lary mdigits. 2.2 Block Diagram : 2.2.1 Embedding Call back
  • 3. Efficient Technique for Image Stenography Based on coordinates of pixels www.iosrjournals.org 38 | Page 2.2.2 Extracting Callback III. INDENTATIONS AND EQUATIONS In this section, we shall introduce the general operation of the diamond encoding technique. The proposed scheme embeds (2n + 1)- ary digit into n cover pixels, but the diamond encoding scheme can conceal (2k2 + 2k + 1)- ary digit into a cover pixel pair where k is the embedding parameter. The detail of this scheme is described as follows. Assume that a, b, p, and q are pixel values, and k is a positive integer. The neighborhood set Sk(p, q) represents the set that contains all the vectors (a, b) with the distance to vector (p, q) smaller than k, and Sk(p, q) is defined as the following form: sk (p,q) = { (a,b) (p - q) + (q - b) <= k }; -------- 3 sk =number of elements of the set Sk, and each member in Sk is called neighboring vector of (p, q). the following equations are used to be found sk Sk = + ----------- 4 = = 1 + ((k(k+1))) / 2 * 4 ; = 1 + 2k(k+1); = 2k2 + 2k + 1; For extraction we are using the following formula: F (p’,q’) = _(2k + 1) × p’ + q’ mod l ------- 5 Here (p’ , q’) = coordinates of extracted pixel pairs l = 2k2 +2k +1. ------------- 6 Here is an example to describe how the proposed algorithm actually works. Assume that the embedding parameter k = 2 and l = 13. Suppose we have pixel pairs x = 20 and y = 31 and we use (4) to calculate DCV by computing f (20, 31) = (20 × 5 + 31)mod13 = 1. Now let us take st = 11(13) as the embedded secret digit, and we can obtain the modulus distance dt = 11−1mod 13 = 10 by computing Then, we search D2(20, 31) which is shown in Figure 2 and obtain the neighboring vector (22, 31) locating in set S2(20, 31) and dk = 10. Therefore, the values of pixel pair (20, 31) are replaced with (22, 31). In the secret data extraction phase, the stego-pixel pairs x_ = 22 and y_ = 31 can be used to compute the DCV by f (22, 31) = 22 × 5 + 28mod13 = 11. Finally, the secret digit st is obtained. Stego image pixel pair Neighbour matrix Modulus distance calculate Secret Data
  • 4. Efficient Technique for Image Stenography Based on coordinates of pixels www.iosrjournals.org 39 | Page IV. FIGURES AND TABLES 4 .1 Resulting Images In this paper five cover images Lena, Zelda, of 128×128 pixels as shown in the figure 4. 1a, 1b, 2 a,2b are considered. Then to evaluate the performance of the proposed method, several experiments have been carried by considering for secret text . The results of above algorithm have been shown below Fig (1 a) input image Fig (2 a) input image Fig (1 b) stego image Fig (2 b) stego image In our experiments, the quality of the stego-image is measured by the peak signal-to-noise ratio (PSNR). The PSNR is the most popular metris to measure the distortion between the cover image and stego- image. It is defined as follows: PSNR = 10 log 10 (255 *255 / MSE) MSE = (1/ M X N) (I/p img – O/p img)^2 4.4 Table Comparison : Smaller k means low capacity and less distortion whereas larger k means high capacity and increased distortion. As expected, Table 1 shows that the growth of payload did depend on the value k. The third column of Table 1 indicates that the numbers of pixels payload is nothing but no of bits to be embedded in an cover image Results of the proposed scheme with different parameter k Table 1 K value Sk Payload Psnr 1 1.16 52 2 13 1.85 49 3 25 2.32 47 4 41 2.68 42 V. CONCLUSION In this paper, we have presented a novel data hiding scheme based on the pixel pair matching technique. The diamond encoding method has been used to alleviate distortions after hiding a secret digit into two cover pixels. It not only keeps high stego-image quality but also considering large amount of data into cover
  • 5. Efficient Technique for Image Stenography Based on coordinates of pixels www.iosrjournals.org 40 | Page images for secret communication. The performance of the proposed method proves to be better than the simple and modify LSB method and other existing schemes in terms of payload and stego-image quality. Acknowledgements This research project would not have been possible without the support of many people. The author wishes to express her gratitude to her supervisor, Prof. Dr . Chandra sekaran HOD / ECE Government Collgege of engg Salem who was abundantly helpful and offered invaluable assistance, support and guidance REFERENCES [1] S.-H. Wang and Y.-P. Lin, ―Wavelet tree quantization for copyright protection watermarking,‖ IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 154–165, 2004. [2] D.-C. Lou and J.-L. Liu, ―Steganographic method for secure communications,‖ Computers and Security, vol. 21, no. 5, pp. 449– 460, 2002. [3] P. L. Lin, C.-K. Hsieh, and P.-W. Huang, ―A hierarchical digital watermarking method for image tamper detection and recovery,‖ Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, 2005. [4] P. W. Wong and N. Memon, ―Secret and public key image watermarking schemes for image authentication and ownershipverification,‖ IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001. [5] C.-K. Chan and L. M. Cheng, ―Hiding data in images by simple LSB substitution,‖ Pattern Recognition, vol. 37, no. 3,pp. 469–474, 2004. [6] Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, ―A secure data hiding scheme for binary images,‖ IEEE Transactions onCommunications, vol. 50, no. 8, pp. 1227–1231, 2002. [7] A.Westfeld, ―F5—a steganographic algorithm,‖ in Proceedings of the 4th International Workshop on Information Hiding(IH ’01), vol. 2137 of Lecture Notes in Computer Science, pp. 289–302, Pittsburgh, Pa, USA, April 2001.