This document proposes a novel image steganography technique based on pixel pair matching. The technique uses "diamond encoding" to embed secret data by adjusting pixel values in image blocks. It can conceal a (2k^2 + 2k + 1)-ary digit into each pixel pair by modifying at most one pixel value. The embedding and extraction processes are described. Experimental results on test images like Lena show the technique can hide more secret data while maintaining good stego-image quality as measured by PSNR, outperforming simple LSB substitution methods.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper presents embedding of data in an image using pixel-value differencing technique. This scheme is used to embed large amount of data by changing the difference between two pixels so that we are able to increase the embedding capacity. There is another technique that is pixel value shifting which also increase the embedding capacity but according to this scheme capacity will increase at edge areas of image.
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations.
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...csandit
This paper proposes a new framework based on Binary Decision Diagrams (BDD) for the graph distribution problem in the context of explicit model checking. The BDD are yet used to represent the state space for a symbolic verification model checking. Thus, we took advantage of high compression ratio of BDD to encode not only the state space, but also the place where each state will be put. So, a fitness function that allows a good balance load of states over the nodes of an homogeneous network is used. Furthermore, a detailed explanation of how to
calculate the inter-site edges between different nodes based on the adapted data structure is presented
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
This paper presents embedding of data in an image using pixel-value differencing technique. This scheme is used to embed large amount of data by changing the difference between two pixels so that we are able to increase the embedding capacity. There is another technique that is pixel value shifting which also increase the embedding capacity but according to this scheme capacity will increase at edge areas of image.
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
This paper presents a novel technique for improved data embedding in cover images based on least significant bit and pixel-value differencing. The proposed method is based on the properties of human visual system i.e. eyes can tolerate larger changes in edge areas as compared to smooth areas. Therefore, the method utilizes the HVS concept and hides large amount of secret data in edge areas while less amount of data in smooth areas. The results of the proposed method are verified using extensive simulations.
STATE SPACE GENERATION FRAMEWORK BASED ON BINARY DECISION DIAGRAM FOR DISTRIB...csandit
This paper proposes a new framework based on Binary Decision Diagrams (BDD) for the graph distribution problem in the context of explicit model checking. The BDD are yet used to represent the state space for a symbolic verification model checking. Thus, we took advantage of high compression ratio of BDD to encode not only the state space, but also the place where each state will be put. So, a fitness function that allows a good balance load of states over the nodes of an homogeneous network is used. Furthermore, a detailed explanation of how to
calculate the inter-site edges between different nodes based on the adapted data structure is presented
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
Vector quantization is an elementary technique for image compression; however, searching for the nearest codeword in a codebook is time-consuming. In this work, we propose a hardware-based scheme by adopting bit-parallelism to prune unnecessary codewords. The new scheme uses a “Bit-mapped Look-up Table” to represent the positional information of the codewords. The lookup procedure can simply refer to the bitmaps to find the candidate codewords. Our simulation results further confirm the effectiveness of the proposed scheme.
ExcelR is considered as the best Data Science training institute in Bangalore which offers services from training to placement as part of the Data Science training program with over 400+ participants placed in various multinational companies including E&Y, Panasonic, Accenture, VMWare, Infosys, IBM, etc.
Learn about how to best present your photographic work in a slideshow.
Presented at the November 2012 Education Meeting by Steve Ray.
http://www.comoxvalleycameraclub.org
IOSR Journal of Applied Chemistry (IOSR-JAC) is an open access international journal that provides rapid publication (within a month) of articles in all areas of applied chemistry and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in Chemical Science. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
Vector quantization is an elementary technique for image compression; however, searching for the nearest codeword in a codebook is time-consuming. In this work, we propose a hardware-based scheme by adopting bit-parallelism to prune unnecessary codewords. The new scheme uses a “Bit-mapped Look-up Table” to represent the positional information of the codewords. The lookup procedure can simply refer to the bitmaps to find the candidate codewords. Our simulation results further confirm the effectiveness of the proposed scheme.
ExcelR is considered as the best Data Science training institute in Bangalore which offers services from training to placement as part of the Data Science training program with over 400+ participants placed in various multinational companies including E&Y, Panasonic, Accenture, VMWare, Infosys, IBM, etc.
Learn about how to best present your photographic work in a slideshow.
Presented at the November 2012 Education Meeting by Steve Ray.
http://www.comoxvalleycameraclub.org
IOSR Journal of Applied Chemistry (IOSR-JAC) is an open access international journal that provides rapid publication (within a month) of articles in all areas of applied chemistry and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in Chemical Science. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IOSR Journal of Electronics and Communication Engineering(IOSR-JECE) is an open access international journal that provides rapid publication (within a month) of articles in all areas of electronics and communication engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in electronics and communication engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
In a color image every pixel value composed of red, green and blue component and each of which ranges from 0 to 255 in case of 8-bit representation. In this paper, we have used pixel value differencing (PVD) method for secret data embedding in each of the component of a pixel in a color image. But when we use pixel-value differencing (PVD) method as image steganographic scheme, the pixel values in the stegoimage may exceed the range 0~255. We have eliminated this overflow problem of each component pixel. Furthermore for providing more security, we have used different number of bits in different pixel components. It would be very difficult to trace how many bits are embedded in a pixel of the stego image. From the experiments it is seen that the results obtained in proposed method provides better visual quality of stego-image compared to the PVD method.
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPcsandit
Most watermark methods use pixel values or coefficients as the judgment condition to embed or
extract a watermark image. The variation of these values may lead to the inaccurate condition
such that an incorrect judgment has been laid out. To avoid this problem, we design a stable
judgment mechanism, in which the outcome will not be seriously influenced by the variation.
The principle of judgment depends on the scale relationship of two pixels. From the observation
of common signal processing operations, we can find that the pixel value of processed image
usually keeps stable unless an image has been manipulated by cropping attack or halftone
transformation. This can greatly help reduce the modification strength from image processing
operations. Experiment results show that the proposed method can resist various attacks and
keep the image quality friendly.
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...cscpconf
In a gray scale image the pixel value ranges from 0 to 255. But when we use pixel-value
differencing (pvd) method as image steganographic scheme, the pixel values in the stego-image
may exceed gray scale range. An adaptive steganography based on modified pixel-value
differencing through management of pixel values within the range of gray scale has been
proposed in this paper. PVD method is used and check whether the pixel value exceeds the
range on embedding. Positions where the pixel exceeds boundary has been marked and a delicate handle is used to keep the value within the range. From the experimental it is seen that the results obtained in proposed method provides with identical payload and visual fidelity of stego-image compared to the pvd method
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by
another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis
etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its
large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The
ergodicity property of chaotic system is utilized to perform the permutation process; a substitution
operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix
is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid
chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are
then applied to perform the permutation process. The encryption’s key streams not only depend on the
cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by
another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by
bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption
rate. The security and performance analysis have been performed, including key space analysis, histogram
analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis
etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its
large key space and efficient permutation-substitution operation, and therefore it is suitable for practical
image and video encryption
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
This paper proposed a novel color image encryption scheme based on multiple chaotic systems. The ergodicity property of chaotic system is utilized to perform the permutation process; a substitution
operation is applied to achieve the diffusion effect. In permutation stage, the 3D color plain-image matrix
is converted to a 2D image matrix, then two generalized Arnold maps are employed to generate hybrid chaotic sequences which are dependent on the plain-image’s content. The generated chaotic sequences are then applied to perform the permutation process. The encryption’s key streams not only depend on the
cipher keys but also depend on plain-image and therefore can resist chosen-plaintext attack as well as
known-plaintext attack. In the diffusion stage, four pseudo-random gray value sequences are generated by another generalized Arnold map. The gray value sequences are applied to perform the diffusion process by bitxoring operation with the permuted image row-by-row or column-by-column to improve the encryption rate. The security and performance analysis have been performed, including key space analysis, histogram analysis, correlation analysis, information entropy analysis, key sensitivity analysis, differential analysis etc. The experimental results show that the proposed image encryption scheme is highly secure thanks to its large key space and efficient permutation-substitution operation, and therefore it is suitable for practical image and video encryption.
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
Elliptic Curve Cryptography (ECC) gained a lot of attention in industry. The key attraction of ECC over RSA is that it
offers equal security even for smaller bit size, thus reducing the processing complexity. ECC Encryption and Decryption methods can
only perform encrypt and decrypt operations on the curve but not on the message. This paper presents a fast mapping method based on
matrix approach for ECC, which offers high security for the encrypted message. First, the alphabetic message is mapped on to the
points on an elliptic curve. Later encode those points using Elgamal encryption method with the use of a non-singular matrix. And the
encoded message can be decrypted by Elgamal decryption technique and to get back the original message, the matrix obtained from
decoding is multiplied with the inverse of non-singular matrix. The coding is done using Verilog. The design is simulated and
synthesized using FPGA.
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
This paper presents an efficient algorithm to accelerate software video encoders/decoders by reducing the number of arithmetic operations for Discrete Cosine Transform (DCT). A multiplierless Ramanujan Ordered Number DCT (RDCT) is presented which computes the coefficients using shifts and addition operations only. The reduction in computational complexity has improved the performance of the video codec by almost 58% compared with the commonly used integer DCT. The results show that significant computation reduction can be achieved with negligible average peak signal-to-noise ratio (PSNR) degradation. The average structural similarity index matrix (SSIM) also ensures that the degradation due to the approximation is minimal.
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
In this paper A Median Based Directional Cascaded with Mask (MBDCM) filter has been proposed, which is based on three different sized cascaded filtering windows. The differences between the current pixel and its neighbors aligned with four main directions are considered for impulse detection. A direction index is used for each edge aligned with a given direction. Minimum of these four direction indexes is used for impulse detection under each masking window. Depending on the minimum direction indexes among these three windows new value to substitute the noisy pixel is calculated. Extensive simulations showed that the MBDCM filter provides good performances of suppressing impulses from both gray level and colored benchmarked images corrupted with low noise level as well as for highly dense impulses. MBDCM filter gives better results than MDWCMM filter in suppressing impulses from highly corrupted digital images.
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
In this paper A Median Based Directional Cascaded with Mask (MBDCM) filter has been proposed, which is based on three different sized cascaded filtering windows. The differences between the current pixel and its neighbors aligned with four main directions are considered for impulse detection. A direction index is used for each edge aligned with a given direction. Minimum of these four direction indexes is used for impulse detection under each masking window. Depending on the minimum direction indexes among these three windows new value to substitute the noisy pixel is calculated. Extensive simulations showed that the MBDCM filter provides good performances of suppressing impulses from both gray level and colored benchmarked images corrupted with low noise level as well as for highly dense impulses. MBDCM filter gives better results than MDWCMM filter in suppressing impulses from highly corrupted digital images.
Chaos Image Encryption using Pixel shuffling cscpconf
The advent of wireless communications, both inside and outside the home-office environment
has led to an increased demand for effective encryption systems. The beauty of encryption
technology comes out in more pronounced way when there is no absolute relation between
cipher and original data and it is possible to rebuild the original image in much easier way. As
chaotic systems are known to be more random and non-predictable, they can be made utilized in
achieving the encryption. The transposition technology of encryption systems requires scrambleness
behaviour in order to achieve the encryption of the data. This scrambleness behaviour can
be derived from the randomness property of chaos which can be better utilized in the techniques
like transposition system. In wireless communication systems, bandwidth utilization is an important
criterion. In order to use encryption system in wireless communication; key space plays an
important role for the efficient utilization of the bandwidth. In this paper we present a chaosbased
encryption algorithm for images. This algorithm is based on pixel scrambling where in the
randomness of the chaos is made utilized to scramble the position of the data. The position of the
data is scrambled in the order of randomness of the elements obtained from the chaotic map and
again rearranged back to their original position in decryption process. The same algoritm is
tested with two different maps and performance analysis is done to select best suited map for encription.
Efficient & Secure Data Hiding Using Secret Reference MatrixIJNSA Journal
Steganography is the science of secret message delivery using cover media. The cover carriers can be image, video, sound or text data. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Chang method of Secret Reference Matrix. The data is hidden in 8 bit gray scale image using 256 X 256 matrix which is constructed by using 4 x 4 table with unrepeated digits from 0~15. The proposed method has high hiding capacity, better stego-image quality, requires little calculation and is easy to implement.
Image steganography techniques can be classified into two major categories such as spatial domain techniques and frequency domain techniques.
In spatial domain techniques the secret message is hidden inside the image by applying some manipulation over the different pixels of the image.
In frequency domain techniques the image is transformed to another form by applying a transformation like discrete wavelet transform and then the message is hidden by applying any of the usual embedding techniques.
This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique.
Similar to Efficient Technique for Image Stenography Based on coordinates of pixels (20)
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
6th International Conference on Machine Learning & Applications (CMLA 2024)
Efficient Technique for Image Stenography Based on coordinates of pixels
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 36-40
www.iosrjournals.org
www.iosrjournals.org 36 | Page
Efficient Technique for Image Stenography Based on coordinates
of pixels
S.Thenmozhli1
, Dr.M.Chandra sekaran2
1
(Research Scholar, Anna / Anna University, Chennai)
2
(HOD ECE , GCE / Anna University Name,Salem)
Abstract : A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment
is proposed. The proposed method is the extension of the diamond encoding embedding scheme. First, choosing
the cropped region from given cover image select 4 pixel pairs from cropped region, and one secret k-ary digit
is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit
and it can be obtained by adjusting pixel values in a block. Here embedding parameter k, and the block
capacity is equal to log2(2k2 + 2k + 1). The diamond encoding provides an easy way to produce a more
perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret
data can be extracted without disturbing the original cover image. Experimental results have demonstrated that
the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation
imperceptible.
Keywords – stegnography,pixel pair matching,lsb
I. INTRODUCTION
STEGANOGRAPHY is the art of hiding secret information in the form of cover which can be image
complex audio, video or any sophisticated biometrics formats Clearly, the goal of cryptography is to protect the
content of messages , steganography is to hide the existence of messages. An advantage of steganography is that
it can be employed to secretly transmit messages without the fact of the transmission being discovered.
Generically, the steganography process is classified into two phases in majority of the prior research work e.g.
message embedding and extraction. In the embedding operation, a secret message is transformed into a bit
stream of bits; this is embedded into the least significant bits (LSBs) of the image pixels. The embedding
overwrites the pixel LSB with the message bit if the pixel LSB and message bit do not match. Otherwise, no
changes are necessary. For the extraction operation, message bits are retrieved from pixel LSBs and combined
to form the secret message.
There are two main selection algorithms that can be employed to embed secret message bits:
sequential and random. For sequential selection, the locations of pixels used for embedding are selected
sequentially one after another. For instance, pixels are selected from left to right and top to bottom until all
message bits are embedded. With random selection, the locations of the pixels used for embedding are permuted
and distributed over the whole image. The distribution of the message bits is controlled by a pseudorandom
number generator whose seed is a secret shared by the sender and the receiver. This seed is also called the stego-
key. The latter selection method provides better security than the former because random selection scatters the
image distortion over the whole image, which makes it less perceptible.
II. PROPOSED METHOD
2.1 k ary notational matrix :
The proposed method is the extension of the exploiting embedding scheme is the main idea of
embedding scheme is that each (2n + 1)- k ary notational secret digit is carried by n cover pixels, and only one
pixel value increases or decreases by 1 at most. For each block of n cover pixels, there are 2n possible states of
only one pixel value plus 1 or minus 1.
The 2n states of alteration plus the case in which no pixel is modified form (2n + 1) different cases.
Therefore, the (2n + 1)- k ary notational secret digit is embedded into the cover pixels by changing the state.
Before the data embedding procedure, the preprocess can convert the secret data into sequences of digits with
(2n + 1)-k ary notational representation.
For the simplest case of n = 2, the secret data stream S(2) can be expressed as S(5) where S(d) denotes the
d-ary notational system representation of secret data stream S. Thus, the 5-ary digits can conceal into blocks of
two cover pixels by modifying at most one pixel value. Denote the gray values of a block of two cover pixels as
p1 and p2, and the extraction function f is deepened as a weighted sum modulo 5:
2. Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 37 | Page
Suppose that the transformed 5-ary secret digit s desired to be embedded into the cover pixels p1 and p2.
According to the secret digit, the embedding process can be classified into 5 conditions.
Condition 1. If (s − f (p1, p2)) mod 5 = 0:
No modification is needed because the extraction function f can decrypt the correct secret data.
Condition 2. If (s − f (p1, p2)) mod 5 = 1: Increase the pixel value p1 by 1.
Condition 3. If (s − f (p1, p2)) mod 5 = 2: Increase the pixel value p2 by 1.
Diamond encoding patterns with k = 1 and (b) diamond encoding patterns with k = 2.
Condition 4. If (s − f (p1, p2)) mod 5 = 3 Decrease the pixel value p2 by 1.
Condition 5. If (s − f (p1, p2)) mod 5 = 4: Decrease the pixel value p1 by 1.
Compute the two pixel values x and y by
f( x,y ) = ( (2k + 1) * x + y) mod l ---------- 1
The new stego-image pixel pair can be calculated by replacing f (x, y) with st . The used equation is shown as
follows:
dt = st − f (x,y) mod l. ----------- 2
st - embedded secretdigit st is obtained from the t th index of the sequence of lary mdigits.
2.2 Block Diagram :
2.2.1 Embedding Call back
3. Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 38 | Page
2.2.2 Extracting Callback
III. INDENTATIONS AND EQUATIONS
In this section, we shall introduce the general operation of the diamond encoding technique. The
proposed scheme embeds (2n + 1)- ary digit into n cover pixels, but the diamond encoding scheme can conceal
(2k2 + 2k + 1)- ary digit into a cover pixel pair where k is the embedding parameter. The detail of this scheme is
described as follows. Assume that a, b, p, and q are pixel values, and k is a positive integer. The neighborhood
set Sk(p, q) represents the set that contains all the vectors (a, b) with the distance to vector (p, q) smaller than
k, and Sk(p, q) is defined as the following form:
sk (p,q) = { (a,b) (p - q) + (q - b) <= k }; -------- 3
sk =number of elements of the set Sk, and each member in Sk is called neighboring vector of (p, q). the
following equations are used to be found sk
Sk = + ----------- 4
=
= 1 + ((k(k+1))) / 2 * 4 ;
= 1 + 2k(k+1);
= 2k2
+ 2k + 1;
For extraction we are using the following formula:
F (p’,q’) = _(2k + 1) × p’ + q’ mod l ------- 5
Here (p’ , q’) = coordinates of extracted pixel pairs
l = 2k2 +2k +1. ------------- 6
Here is an example to describe how the proposed algorithm actually works. Assume that the
embedding parameter k = 2 and l = 13. Suppose we have pixel pairs x = 20 and y = 31 and we use (4) to
calculate DCV by computing f (20, 31) = (20 × 5 + 31)mod13 = 1. Now let us take st = 11(13) as the embedded
secret digit, and we can obtain the modulus distance dt = 11−1mod 13 = 10 by computing Then, we search
D2(20, 31) which is shown in Figure 2 and obtain the neighboring vector (22, 31) locating in set S2(20, 31) and
dk = 10. Therefore, the values of pixel pair (20, 31) are replaced with (22, 31).
In the secret data extraction phase, the stego-pixel pairs x_ = 22 and y_ = 31 can be used to
compute the DCV by f (22, 31) = 22 × 5 + 28mod13 = 11. Finally, the secret digit st is obtained.
Stego image pixel
pair
Neighbour matrix
Modulus distance calculate
Secret Data
4. Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 39 | Page
IV. FIGURES AND TABLES
4 .1 Resulting Images
In this paper five cover images Lena, Zelda, of 128×128 pixels as shown in the figure 4. 1a, 1b, 2 a,2b
are considered. Then to evaluate the performance of the proposed method, several experiments have been
carried by considering for secret text . The results of above algorithm have been shown below
Fig (1 a) input image Fig (2 a) input image
Fig (1 b) stego image Fig (2 b) stego image
In our experiments, the quality of the stego-image is measured by the peak signal-to-noise ratio
(PSNR). The PSNR is the most popular metris to measure the distortion between the cover image and stego-
image. It is defined as follows:
PSNR = 10 log 10 (255 *255 / MSE)
MSE = (1/ M X N) (I/p img – O/p img)^2
4.4 Table Comparison :
Smaller k means low capacity and less distortion whereas larger k means high capacity and increased
distortion. As expected, Table 1 shows that the growth of payload did depend on the value k. The third column
of Table 1 indicates that the numbers of pixels payload is nothing but no of bits to be embedded in an cover
image Results of the proposed scheme with different parameter k
Table 1
K value Sk Payload Psnr
1 1.16 52
2 13 1.85 49
3 25 2.32 47
4 41 2.68 42
V. CONCLUSION
In this paper, we have presented a novel data hiding scheme based on the pixel pair matching
technique. The diamond encoding method has been used to alleviate distortions after hiding a secret digit into
two cover pixels. It not only keeps high stego-image quality but also considering large amount of data into cover
5. Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 40 | Page
images for secret communication. The performance of the proposed method proves to be better than the simple
and modify LSB method and other existing schemes in terms of payload and stego-image quality.
Acknowledgements
This research project would not have been possible without the support of many people. The author
wishes to express her gratitude to her supervisor, Prof. Dr . Chandra sekaran HOD / ECE Government Collgege
of engg Salem who was abundantly helpful and offered invaluable assistance, support and guidance
REFERENCES
[1] S.-H. Wang and Y.-P. Lin, ―Wavelet tree quantization for copyright protection watermarking,‖ IEEE Transactions on Image
Processing, vol. 13, no. 2, pp. 154–165, 2004.
[2] D.-C. Lou and J.-L. Liu, ―Steganographic method for secure communications,‖ Computers and Security, vol. 21, no. 5, pp. 449–
460, 2002.
[3] P. L. Lin, C.-K. Hsieh, and P.-W. Huang, ―A hierarchical digital watermarking method for image tamper detection and recovery,‖
Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, 2005.
[4] P. W. Wong and N. Memon, ―Secret and public key image watermarking schemes for image authentication and
ownershipverification,‖ IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001.
[5] C.-K. Chan and L. M. Cheng, ―Hiding data in images by simple LSB substitution,‖ Pattern Recognition, vol. 37, no. 3,pp. 469–474,
2004.
[6] Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, ―A secure data hiding scheme for binary images,‖ IEEE Transactions onCommunications,
vol. 50, no. 8, pp. 1227–1231, 2002.
[7] A.Westfeld, ―F5—a steganographic algorithm,‖ in Proceedings of the 4th International Workshop on Information Hiding(IH ’01),
vol. 2137 of Lecture Notes in Computer Science, pp. 289–302, Pittsburgh, Pa, USA, April 2001.