SlideShare a Scribd company logo
1 of 5
Download to read offline
Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

A Novel Secured RGB LSB Steganography with Enhanced StegoImage Quality
Koyi Lakshmi Prasad*, Dr. T.Ch.Malleswara Rao**
* (Assistant Professor, Department of Computer Science and Engineering, QIS College of Engg & Technology)
** (Professor, School of Electronics, Sreenidhi Institute of Technology, Hyderabad, India)

ABSTRACT
Steganography is the science of writing hidden messages in such a way that no one apart from the intended
recipient knows of the existence of the messages. Steganography is a greek origin word which is pronounced as
Stehg-uh-nah-grunf-ee where steganous means secret or covered and graphie means writing. In this paper a new
steganography technique is presented, implemented and analyzed. The proposed RGB LSB method hides the
secret message based on the comparison and searching about the identical bits between the secret messages and
image pixel values. The proposed method is compared with LSB benchmarking method and achieved a efficient
image with enhanced stego-image quality.
Keywords: Identical bits, LSB, LSB benchmarking, RGB, Steganography, Stego-image.

I.

INTRODUCTION

Steganography is the science of writing
hidden messages in such a way that no one apart from
the intended recipient knows of the existence of the
messages. Steganography is a greek origin word which
is pronounced as Stehg-uh-nah-grunf-ee where
steganous means secret or covered and graphie means
writing. The message can be a text, an image or it can
be an audio file [1, 6, 9].
Steganography methods were started in
ancient Greece at 400 BC. In ancient Greece, text was
written on wax covered tablets. One of the most
popular story is that “Demeratus” wanted to
promulgate Sparta that xerxes intended to invade
Greece. So to convey that message to Spartans he
scraped wax out of tablets and wrote a message on the
underlying wooden blanks. He covered the tablets with
wax again. The tablets appeared to be unused, so when
the material is checked by sentries no one can identify
them and allowed to move [6, 9].
Greeks used to shave the head of their slaves
and tattoo a secret message on their heads. Until the
hair was completely grown the slaves were not allowed
to move. When hair was grown they were sent to
various places to deliver the message to their agents.
As well as invisible inks these inks came into focus
when there usage gave success in the Second World
War. An innocent letter may contain a very different
message written between the lines. Early in World War
II steganographic technology consisted almost
exclusively of invisible inks. Common source to
prepare these type of ink was milk, fruit juices etc.
these get darken when they are heated.
Null cipher is another method used for
steganography where the real message is
"camouflaged" in an innocent sounding message. Due
to the "sound" of many open coded messages, the
www.ijera.com

suspect communications were detected by mail filters.
The Germans developed microdot technology which
FBI Director J. Edgar Hoover referred to as "the
enemy's masterpiece of espionage." Microdots are
photographs the size of a printed period having the
clarity of standard-sized typewritten pages. The first
microdots were discovered masquerading as a period
on a typed envelope carried by a German agent in 1941
[5].
Masking and filtering is another technique
where information is hidden inside of a image using
digital watermarks that include information such as
copyright, ownership, or licenses. The purpose is
different from traditional steganography since it is
adding an attribute to the cover image thus extending
the amount of information presented. Algorithms and
Transformations techniques are used to hide data in
mathematical functions that are often used in
compression algorithms. The idea of this method is to
hide the secret message in the data bits in the least
significant coefficients.
The main motivation behind the development
of image steganography methods is its way to use in
various organizations to communicate between its
members. It can be also used to communicate between
military, intelligence and secret agents. The main aim
of image steganography is to avoid attention of the
hackers when transmitting hidden information [6, 9].
The main attributes of the Steganography are:
cover message, secret message, and secret key and
embedding algorithm. The cover message is used to
cover the encoded text in itself; it acts like a medium to
hide things inside it. Secret message is the message
which we want to transmit. The secret key is the key
which is known by us to encode the secret message.
The embedding algorithm is used to embed the text
inside the cover message.
1299 | P a g e
Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303
In the Steganography system the entire
scenario is that first we have to opt for the best cover
message as it may be like any of the media elements
(image, video, audio). We have to encode the secret
message using an appropriate key. Then we have use
and embedding algorithm to embed the secret text in
the cover message. When the stego-image is ready, we
can send to the desired person by any mode of
communication.
In the modern scenario many cover messages
can be used such as image, video, audio. The image
file is the most popularly used cover message because
it is easy to transmit messages from sender to receiver.
The images are basically divided into three categories
they are: binary images, Gray scale images and RGB
images. In binary images every one bit value for pixel
represents 0 for black and 1 for white. In Gray scale
images every pixel has 8-bit value where 00000000
represents black and 11111111 represents white. In
RGB (RED-GREEN-BLUE) images every pixel has
24-bit value where (00000000 - 00000000 - 00000000)
represents black and (11111111-11111111-11111111)
represents white. We use the RGB images because a
slight change in the RGB images doesn’t make any
change in the image resolution so ultimately which
will not affect the quality of the image and the data
will be highly secure.

II.

BACKGROUND THEORY

In the last few years the theoretical
foundations of information hiding has advanced very
rapidly. Modeling the information hiding process as
one of the communication security produced
improved information hiding algorithms as well as
accurate models of the channel capacity and error
rates. At the same time, steganography security, i.e. the
ability of information hiding to serve in a scenario
where the presence of an enemy explicitly aiming at
nullifying the hidden information goals, whatever they
are, has been recognized as one of the main open
issues steganographic techniques face with.
As explained in reference [8, 10], for all the
steganographic systems,
most
vital
and
elementary
requirement is the un-detectability.
The hidden message should not be detected by any
other people. Moreover, the cover message with
hidden message i.e. stego-media are indistinguishable
from the original ones i.e. Cover media. The cover
media and stego-media should appear identical under
all possible statistical attacks and the embedding
process should not degrade the media fidelity [8]
presents several attacks on cover media. The difference
between stego-media and the cover-media should be
imperceptible for visual attacks.
Steganography uses two types of protocols:
secret-key and public- key steganography. In secretkey steganographic model, both sender and receiver
share a secret-key before conveying messages.
The input message may be in any digital form and be
treated as a bit stream. Public-key cryptography
www.ijera.com

www.ijera.com

requires the use of two keys, one private and one
public key. The public-key is used in the embedding
process where as the private key is used to extract the
hidden message.
Even though a considerable number of
steganography techniques were in use, study of this
subject in the scientific literature goes back to
Simmons [3, 5, 11], who in 1983 formulated it as the
“prisoners’ problem”.
A detailed review on
steganographic techniques is discussed by the author in
her previous paper Ref. [2].
2.1 Digital Steganography Methods
The steganography applications range from
those that actually hide data, often encrypted, with in
the file, to those that simply attach hidden information
to the end of a file such as Camouflage. As explained
in Ref. [7], the community is concerned with a number
of digital technologies, namely, text files, images,
movies and audio. One of the main methods typically
used for steganography involves the process of hiding
a message in image pixels. Digital images are the most
wide spread carrier medium used [9]. NeilF.Johnson[6]
explains different methods of hiding data in digital
images.
2.2 Image-based Steganography
Many steganographic tools in the internet are
available for varied image formats. The fact that image
scan be usefully subjected to lossy compression
methods has suggested that extra information could be
concealed in them .Properties of image scan be
manipulated including luminescence, contrast and
colors. A24-bit color image has three components
corresponding to Red, Green and Blue. The three
components are normally quantized using 8 bits. An
image made of these components is described as a 24bit color image. Each byte can have a value from 0
to255representing the intensity of the color. The
darkest color value is 0 and the brightest is 255.
Transparency is controlled by the addition of
information to each element of the pixel data. A24-bit
pixel value can be stored in 32bits. The extra 8 bits is
for specifying transparency. This is sometime scaled
the alpha channel. An ideal 8-bit alpha channel can
support transparency levels
from 0(completely
transparent) to255 (completely opaque). It can be
stored as part of the pixel data. Structure of digital
images is discussed in the “An evaluation of Image
Based Steganography Methods” by Kevin Curran
of Internet Technologies Research Group [9].
Current techniques for embedding of messages into
image carriers fall into three categories [4][7]:
 Least-Significant Bit embedding (or simple
embedding).
 Advanced Least-Significant Bit embedding.

1300 | P a g e
Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303
III.

EXISTING METHODS

3.1 Least Significant Bit Embedding
Least significant bit embedding technique is
the most popular steganography technique. Depending
upon the binary coding of the secret message it hides
the message in the binary coded image. The below
figure (a) depicts the knowledge of pixel values and
secret messages. LSB makes changes in the image
which are very easy to recognize and the stego images
are easy to attack.

Fig 1: Least Significant Bit Hiding Technique
3.1.1 Algorithm for LSB Method
 Steps to Hide the Message Using the LSB
Method.
 Choose the proper image for the cover
medium.
 Scan the image row by row and encode it in
to binary form.
 Encode the secret message into binary
notation.
 Calculate the sizes of the image and secret
message.
 Consider one pixel of the image.
 Segment the image into three parts (Red,
Green and Blue parts)
 Hide two by two bits of the secret message in
each position of the pixel at the last two
significant positions.
 Set the image with the newly considered
values.
 Set the image and save it.
3.2 Advanced LSB Embedding
The LSB method hides the secret text at the
least two significant bits of the image pixels. Hence a
change in the value of image pixels affects the image
resolution, which ultimately leads to the reduction of
image quality and make the image easy to attack. This
LSB method is already attacked and broken. So in
advanced LSB we are hiding the secret message based
on searching about the identical values between the
image pixels and secret messages. The image shown
below gives a clear idea of arrangements of bits in the
image pixel.

Fig 2: Advanced Least Significant Bit Hiding
Technique
www.ijera.com

www.ijera.com

3.2.1 Algorithm for Advanced LSB Method
 Steps to Hide the Message Using the LSB
Method.
 Choose the proper image for the cover
medium.
 Scan the image row by row and encode it in
to binary form.
 Encode the secret message into binary
notation.
 Calculate the sizes of the image and secret
message.
 Consider one pixel of the image.
 Segment the image into three parts (Red,
Green and Blue parts)
 Hide two by two bits of the secret message in
each position of the pixel by searching the
identical.
 If the search is unsuccessful then hide two by
two bits of the secret message in the least
significant position of pixel image.
 Store the positions of the hiding bits in a
binary table.
 Set the image with the newly considered
values.
 Set the image and save it.

IV.

PROPOSED METHOD

when we consider all the existing techniques
for steganography we come across with the facts that
we are replacing the least significant bits of the pixel
images with the bits of the secret message hence which
ultimately leads to the downfall of the quality of the
image .in the proposed method we are considering the
RGB image and converting that image into binary
form. While considering the secret message each
character is represented with 8 bits. We will segment
these 8 bits into 3 parts (3bits+3bits+2 bits). We will
select an image pixel randomly using a random
function and compare the equivalence of the message
bits with the pixel image bits. When the case is
identical we replace the bits with those identical. If the
case is non- identical we will simply replace the bits
with the least significant bits of the image pixel. So
when we are selecting the pixel image randomly and
hiding the total 8 bits in one single pixel image, we are
providing a better image resolution as compared to
existing models.
4.1 Algorithm for Proposed Method
 Steps to Hide the Message Using the RGB
LSB Method:
 Choose the proper image for the cover
medium.
 Scan the image row by row and encode it in
to binary form.
 Encode the secret message into binary
notation.
 Calculate the sizes of the image and secret
message.
 Consider one pixel of the image randomly.
1301 | P a g e
Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303








Segment the image into three parts (Red,
Green and Blue parts).
Segment the secret message into three parts
(3bits, 3bits and 2bits).
Hide the bits of the secret message in each
position of the pixel by searching the
identical.
If the search is unsuccessful then hide the bits
of the secret message in the least significant
position of pixel image.
Store the positions of the hiding bits in a
binary table.
Set the image with the newly considered
values.
Set the image and save it.

S.No
1
2
3
4
5
6
7
8
9

V.

www.ijera.com

EXPERIMENTAL ANALYSIS

The traditional LSB methods do not provide
high capacity and flexibility to hide a whole character
in a single pixel. Usually steganography is applied to
normal images; by the segmentation technique we can
provide higher level security to the secret message
against steganalysis. Compared to the steganography
used to hide the normal text, this proposed method
provides rather better security with the use of cipher
text. In total the analysis shows that the performance of
the proposed method is much better than the existing
methodologies.

Table 1: Comparative Results
Regular
Original
LSB
71.2131
71.2107
91.4541
91.4515
116.8887
116.8766
82.7183
82.7076
131.8025
131.799
101.9898
101.9865
105.4361
105.4215
91.9313
91.9226
18.9911
18.9803

Proposed
RGB LSB
71.2133
91.454
116.8881
82.7182
131.8025
101.9898
105.4353
91.9305
18.9914

Fig 3: Original Images and its Histograms

Fig 4: Regular LSB Embedded Images and its Histograms

Fig 5: Proposed COLOR LSB embedded Images and its Histograms
www.ijera.com

1302 | P a g e
Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications
ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303
The above results point up that the mean of
proposed method values increased than original and
regular LSB methods. When message is embedding
in the image by using regular LSB method, message
bits stored in pixels eight bit plane. Thus, the pixel
value does not change well. Then mean value of
image also not changed much and the value is
relative to original image mean. When message is
embedding in the image by using proposed RGB
LSB method, Message bits of single character stored
in single RGB pixel. So, pixel value changes a tiny
than other embedding methods. Even though mean
value of proposed method increases integrity of
message and sturdiness of message security is
enhanced.
In total the analysis shows that the performance of
the proposed method is much better than the current
methodologies.

VI.

CONCLUSION

In this paper a new steganography technique
presented, analyzed and implemented. The proposed
method hides the secret message based on comparing
and searching the least significant bits of RGB image
in an order of(3bits to R- component-3bits to Gcomponent-2bits to B- component)by which we can
hide a single character in one pixel image, so that
only
appropriate number of pixel images are
required to hide the secret message. While we are
selecting a pixel image randomly, image will not get
affected in the issues of resolution and clarity. The
proposed method was compared with the LSB and
advanced LSB methods which hide the data in least
significant bits and identical bits.
The proposed and LSB methods were used
to implement stego image for the secret message on
number of different images. The results of the
proposed and LSB hiding methods were analyzed
based on the mean of original image and embedded
image. This paper conclude that that the proposed
stegonography method is highly efficient, ace and
accurate than the LSB methods which were proposed,
it starts comparing and searching the identical bits in
the pixel image and hides the data in it so that the
resolution and quality of the images are never
affected and keeps the message more secure. The
experimental results also depict that the efficiency
rate of the proposed method is relatively high when
compared to the existing methods.

[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

www.ijera.com

JinLiand Shawmin Lei, Sharp Laboratories
of America.
A Review of Data Hiding in Digital Images
by Eugene T.Lin and Edward J.Delp, Video
and Image Processing Laboratory (VIPER),
School of Electrical and Computer
Engineering, Purdue University, Indiana.
On the limits of Steganography by Ross
J.Anderson, FabienA. P. Petitcolas, IEEE
Journal
of
selected
areas
in
Communications, 16(4):474-481, May 1998.
Special issue on Copyright & Privacy
protection. ISSN0733-8716.
Exploring Steganography: Seeing the
Unseen by Neil F.Johnson, Sushil Jajodia,
George Mason University.
Steganography and the Art of hiding
information by Vish Krishnan, Overland
Park, K.S.
Information hiding–a survey by Fabien
A.P.Petitcolas, Ross J.Anderson & Markus
G.Kuhn (Proceedings of the IEEE– special
issue on protection of multimedia content,
87(7):1062-1078, July1999).
An
evaluation
of
Image
Based
Steganography Methods by Kevin Curran,
Internet
Technologies Research Group,
University of Ulster Karen Bailey, Institute
of Technology, Letter kenny, Ireland
(International Journal of Digital Evidence).
Secure Error-Free Steganography for JPEG
Images by Yeuan-Kuen Lee, Ling-Hwei
Chen, Department of Computer and
Information Science, National Chiao Tung
University,1001 Taiwan, R.O.C. Second
international Conference on Industrial and
Information Systems, ICIIS2007, 8–
11August, 2007, SriLanka339.
New Steganography Technique for Palette
Based Images by S.G.K.D.N.Samaratunge,
University of Colombo School of
Computing
(UCSC),
University
of
Colombo, Second International Conference
on Industrial and Information Systems,
ICIIS 2007, 8 – 11 August 2007, SriLanka.

REFERENCES
[1]

[2]

[3]

A Discussion of Covert Channels and
Steganography by Mark Owens, March19,
2002.
Review
on
current
Steganography
technologies by S.G.K.D. N.Samaratunge,
7th International Information Technology
Conference, 2005, SriLanka.
An efficient color re-indexing scheme for
palette based compression by Wenjun Zeng,

www.ijera.com

1303 | P a g e

More Related Content

What's hot

Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageprjpublications
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionCSCJournals
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...AM Publications
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
A Review paper on Steganography Techniques
A Review paper on Steganography TechniquesA Review paper on Steganography Techniques
A Review paper on Steganography TechniquesEditor IJMTER
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementIOSR Journals
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.Pradeep Vishwakarma
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherAashirwad Kashyap
 

What's hot (17)

Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
G018143943
G018143943G018143943
G018143943
 
A Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with CompressionA Novel Steganography Technique that Embeds Security along with Compression
A Novel Steganography Technique that Embeds Security along with Compression
 
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
Resourceful and protected Biometric Image Stenography using Discrete Wavelet ...
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
 
Ijetr042105
Ijetr042105Ijetr042105
Ijetr042105
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A Review paper on Steganography Techniques
A Review paper on Steganography TechniquesA Review paper on Steganography Techniques
A Review paper on Steganography Techniques
 
Hiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB ReplacementHiding Text within Image Using LSB Replacement
Hiding Text within Image Using LSB Replacement
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
Be32364369
Be32364369Be32364369
Be32364369
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHYA NOVEL APPROACHES TOWARDS STEGANOGRAPHY
A NOVEL APPROACHES TOWARDS STEGANOGRAPHY
 
“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.“Multimedia Steganography with Cipher Text and Compression ppt.
“Multimedia Steganography with Cipher Text and Compression ppt.
 
Data Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill CipherData Encryption and Decryption using Hill Cipher
Data Encryption and Decryption using Hill Cipher
 

Viewers also liked

H. v. betty actualizada
H. v. betty actualizadaH. v. betty actualizada
H. v. betty actualizadabettymaren
 
Relançamento Paçoca Amor
Relançamento Paçoca AmorRelançamento Paçoca Amor
Relançamento Paçoca AmorHelen Elefant
 
Shopping Girl
Shopping GirlShopping Girl
Shopping Girlkimd25
 
Mad Sciencelogo
Mad SciencelogoMad Sciencelogo
Mad SciencelogoKelleyM
 
Aritx monkeys contents
Aritx monkeys contentsAritx monkeys contents
Aritx monkeys contentsxloopyloox
 
Top 10 soa practices to follow and avoid
Top 10 soa practices to follow and avoidTop 10 soa practices to follow and avoid
Top 10 soa practices to follow and avoidSusheel Jalali
 
Revisión de la cirugía colorrectal laparoscópica por cáncer sociga
Revisión de la  cirugía colorrectal laparoscópica por cáncer socigaRevisión de la  cirugía colorrectal laparoscópica por cáncer sociga
Revisión de la cirugía colorrectal laparoscópica por cáncer socigaHector Nuñez
 
The ARC of Publishing: How eBooks are changing publishing, and what you need ...
The ARC of Publishing: How eBooks are changing publishing, and what you need ...The ARC of Publishing: How eBooks are changing publishing, and what you need ...
The ARC of Publishing: How eBooks are changing publishing, and what you need ...skottk
 
MangásFlamer - Naruto Capítulo 01
MangásFlamer - Naruto Capítulo 01MangásFlamer - Naruto Capítulo 01
MangásFlamer - Naruto Capítulo 01D4RKFLAMER
 
Why Traditional Security has Failed
Why Traditional Security has Failed Why Traditional Security has Failed
Why Traditional Security has Failed Steven_Jackson
 
Кодабра, Фонд "Наше будущее"
Кодабра, Фонд "Наше будущее"Кодабра, Фонд "Наше будущее"
Кодабра, Фонд "Наше будущее"Dmitry Lohansky
 
Etapas y generos_literatura
Etapas y generos_literaturaEtapas y generos_literatura
Etapas y generos_literaturaCarlosDi
 
La acreditación de la asistencia y participación
La acreditación de la asistencia y participaciónLa acreditación de la asistencia y participación
La acreditación de la asistencia y participaciónJesus Castillo
 
Simulació volcànica
Simulació volcànica Simulació volcànica
Simulació volcànica Joan Domenech
 

Viewers also liked (20)

H. v. betty actualizada
H. v. betty actualizadaH. v. betty actualizada
H. v. betty actualizada
 
Syve päivien pajat
Syve päivien pajatSyve päivien pajat
Syve päivien pajat
 
Relançamento Paçoca Amor
Relançamento Paçoca AmorRelançamento Paçoca Amor
Relançamento Paçoca Amor
 
Inf junio 09
Inf  junio 09Inf  junio 09
Inf junio 09
 
Shopping Girl
Shopping GirlShopping Girl
Shopping Girl
 
Mad Sciencelogo
Mad SciencelogoMad Sciencelogo
Mad Sciencelogo
 
Aritx monkeys contents
Aritx monkeys contentsAritx monkeys contents
Aritx monkeys contents
 
Top 10 soa practices to follow and avoid
Top 10 soa practices to follow and avoidTop 10 soa practices to follow and avoid
Top 10 soa practices to follow and avoid
 
Revisión de la cirugía colorrectal laparoscópica por cáncer sociga
Revisión de la  cirugía colorrectal laparoscópica por cáncer socigaRevisión de la  cirugía colorrectal laparoscópica por cáncer sociga
Revisión de la cirugía colorrectal laparoscópica por cáncer sociga
 
Bosco ecoschool
Bosco ecoschoolBosco ecoschool
Bosco ecoschool
 
The ARC of Publishing: How eBooks are changing publishing, and what you need ...
The ARC of Publishing: How eBooks are changing publishing, and what you need ...The ARC of Publishing: How eBooks are changing publishing, and what you need ...
The ARC of Publishing: How eBooks are changing publishing, and what you need ...
 
MangásFlamer - Naruto Capítulo 01
MangásFlamer - Naruto Capítulo 01MangásFlamer - Naruto Capítulo 01
MangásFlamer - Naruto Capítulo 01
 
Alan warde
Alan wardeAlan warde
Alan warde
 
Why Traditional Security has Failed
Why Traditional Security has Failed Why Traditional Security has Failed
Why Traditional Security has Failed
 
Кодабра, Фонд "Наше будущее"
Кодабра, Фонд "Наше будущее"Кодабра, Фонд "Наше будущее"
Кодабра, Фонд "Наше будущее"
 
Family and demographics
Family and demographicsFamily and demographics
Family and demographics
 
Etapas y generos_literatura
Etapas y generos_literaturaEtapas y generos_literatura
Etapas y generos_literatura
 
La acreditación de la asistencia y participación
La acreditación de la asistencia y participaciónLa acreditación de la asistencia y participación
La acreditación de la asistencia y participación
 
Simulació volcànica
Simulació volcànica Simulació volcànica
Simulació volcànica
 
Presentación slide show
Presentación slide showPresentación slide show
Presentación slide show
 

Similar to Hi3612991303

Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in SecurityIJMER
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxAkashBhosale50
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and readingmisbanausheenparvam
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On SteganographyBryce Nelson
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...IJCSEA Journal
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsLisa Brewer
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security Systemijtsrd
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
B03208016
B03208016B03208016
B03208016inventy
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 

Similar to Hi3612991303 (20)

Steganography and Its Applications in Security
Steganography and Its Applications in SecuritySteganography and Its Applications in Security
Steganography and Its Applications in Security
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Presentation1
Presentation1Presentation1
Presentation1
 
steganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptxsteganography-252-uzLRCSm.pptx
steganography-252-uzLRCSm.pptx
 
CSE steganography for data writing and reading
CSE steganography for data writing and readingCSE steganography for data writing and reading
CSE steganography for data writing and reading
 
Steganography
Steganography Steganography
Steganography
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
A Tutorial Review On Steganography
A Tutorial Review On SteganographyA Tutorial Review On Steganography
A Tutorial Review On Steganography
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
A NOVEL APPROACH FOR CONCEALED DATA SHARING AND DATA EMBEDDING FOR SECURED CO...
 
A Survey Of Text Steganography Methods
A Survey Of Text Steganography MethodsA Survey Of Text Steganography Methods
A Survey Of Text Steganography Methods
 
LSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security SystemLSB Based Image Steganography for Information Security System
LSB Based Image Steganography for Information Security System
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
H017255560
H017255560H017255560
H017255560
 
B03208016
B03208016B03208016
B03208016
 
Steganography
Steganography Steganography
Steganography
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Hi3612991303

  • 1. Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303 RESEARCH ARTICLE www.ijera.com OPEN ACCESS A Novel Secured RGB LSB Steganography with Enhanced StegoImage Quality Koyi Lakshmi Prasad*, Dr. T.Ch.Malleswara Rao** * (Assistant Professor, Department of Computer Science and Engineering, QIS College of Engg & Technology) ** (Professor, School of Electronics, Sreenidhi Institute of Technology, Hyderabad, India) ABSTRACT Steganography is the science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the messages. Steganography is a greek origin word which is pronounced as Stehg-uh-nah-grunf-ee where steganous means secret or covered and graphie means writing. In this paper a new steganography technique is presented, implemented and analyzed. The proposed RGB LSB method hides the secret message based on the comparison and searching about the identical bits between the secret messages and image pixel values. The proposed method is compared with LSB benchmarking method and achieved a efficient image with enhanced stego-image quality. Keywords: Identical bits, LSB, LSB benchmarking, RGB, Steganography, Stego-image. I. INTRODUCTION Steganography is the science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the messages. Steganography is a greek origin word which is pronounced as Stehg-uh-nah-grunf-ee where steganous means secret or covered and graphie means writing. The message can be a text, an image or it can be an audio file [1, 6, 9]. Steganography methods were started in ancient Greece at 400 BC. In ancient Greece, text was written on wax covered tablets. One of the most popular story is that “Demeratus” wanted to promulgate Sparta that xerxes intended to invade Greece. So to convey that message to Spartans he scraped wax out of tablets and wrote a message on the underlying wooden blanks. He covered the tablets with wax again. The tablets appeared to be unused, so when the material is checked by sentries no one can identify them and allowed to move [6, 9]. Greeks used to shave the head of their slaves and tattoo a secret message on their heads. Until the hair was completely grown the slaves were not allowed to move. When hair was grown they were sent to various places to deliver the message to their agents. As well as invisible inks these inks came into focus when there usage gave success in the Second World War. An innocent letter may contain a very different message written between the lines. Early in World War II steganographic technology consisted almost exclusively of invisible inks. Common source to prepare these type of ink was milk, fruit juices etc. these get darken when they are heated. Null cipher is another method used for steganography where the real message is "camouflaged" in an innocent sounding message. Due to the "sound" of many open coded messages, the www.ijera.com suspect communications were detected by mail filters. The Germans developed microdot technology which FBI Director J. Edgar Hoover referred to as "the enemy's masterpiece of espionage." Microdots are photographs the size of a printed period having the clarity of standard-sized typewritten pages. The first microdots were discovered masquerading as a period on a typed envelope carried by a German agent in 1941 [5]. Masking and filtering is another technique where information is hidden inside of a image using digital watermarks that include information such as copyright, ownership, or licenses. The purpose is different from traditional steganography since it is adding an attribute to the cover image thus extending the amount of information presented. Algorithms and Transformations techniques are used to hide data in mathematical functions that are often used in compression algorithms. The idea of this method is to hide the secret message in the data bits in the least significant coefficients. The main motivation behind the development of image steganography methods is its way to use in various organizations to communicate between its members. It can be also used to communicate between military, intelligence and secret agents. The main aim of image steganography is to avoid attention of the hackers when transmitting hidden information [6, 9]. The main attributes of the Steganography are: cover message, secret message, and secret key and embedding algorithm. The cover message is used to cover the encoded text in itself; it acts like a medium to hide things inside it. Secret message is the message which we want to transmit. The secret key is the key which is known by us to encode the secret message. The embedding algorithm is used to embed the text inside the cover message. 1299 | P a g e
  • 2. Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303 In the Steganography system the entire scenario is that first we have to opt for the best cover message as it may be like any of the media elements (image, video, audio). We have to encode the secret message using an appropriate key. Then we have use and embedding algorithm to embed the secret text in the cover message. When the stego-image is ready, we can send to the desired person by any mode of communication. In the modern scenario many cover messages can be used such as image, video, audio. The image file is the most popularly used cover message because it is easy to transmit messages from sender to receiver. The images are basically divided into three categories they are: binary images, Gray scale images and RGB images. In binary images every one bit value for pixel represents 0 for black and 1 for white. In Gray scale images every pixel has 8-bit value where 00000000 represents black and 11111111 represents white. In RGB (RED-GREEN-BLUE) images every pixel has 24-bit value where (00000000 - 00000000 - 00000000) represents black and (11111111-11111111-11111111) represents white. We use the RGB images because a slight change in the RGB images doesn’t make any change in the image resolution so ultimately which will not affect the quality of the image and the data will be highly secure. II. BACKGROUND THEORY In the last few years the theoretical foundations of information hiding has advanced very rapidly. Modeling the information hiding process as one of the communication security produced improved information hiding algorithms as well as accurate models of the channel capacity and error rates. At the same time, steganography security, i.e. the ability of information hiding to serve in a scenario where the presence of an enemy explicitly aiming at nullifying the hidden information goals, whatever they are, has been recognized as one of the main open issues steganographic techniques face with. As explained in reference [8, 10], for all the steganographic systems, most vital and elementary requirement is the un-detectability. The hidden message should not be detected by any other people. Moreover, the cover message with hidden message i.e. stego-media are indistinguishable from the original ones i.e. Cover media. The cover media and stego-media should appear identical under all possible statistical attacks and the embedding process should not degrade the media fidelity [8] presents several attacks on cover media. The difference between stego-media and the cover-media should be imperceptible for visual attacks. Steganography uses two types of protocols: secret-key and public- key steganography. In secretkey steganographic model, both sender and receiver share a secret-key before conveying messages. The input message may be in any digital form and be treated as a bit stream. Public-key cryptography www.ijera.com www.ijera.com requires the use of two keys, one private and one public key. The public-key is used in the embedding process where as the private key is used to extract the hidden message. Even though a considerable number of steganography techniques were in use, study of this subject in the scientific literature goes back to Simmons [3, 5, 11], who in 1983 formulated it as the “prisoners’ problem”. A detailed review on steganographic techniques is discussed by the author in her previous paper Ref. [2]. 2.1 Digital Steganography Methods The steganography applications range from those that actually hide data, often encrypted, with in the file, to those that simply attach hidden information to the end of a file such as Camouflage. As explained in Ref. [7], the community is concerned with a number of digital technologies, namely, text files, images, movies and audio. One of the main methods typically used for steganography involves the process of hiding a message in image pixels. Digital images are the most wide spread carrier medium used [9]. NeilF.Johnson[6] explains different methods of hiding data in digital images. 2.2 Image-based Steganography Many steganographic tools in the internet are available for varied image formats. The fact that image scan be usefully subjected to lossy compression methods has suggested that extra information could be concealed in them .Properties of image scan be manipulated including luminescence, contrast and colors. A24-bit color image has three components corresponding to Red, Green and Blue. The three components are normally quantized using 8 bits. An image made of these components is described as a 24bit color image. Each byte can have a value from 0 to255representing the intensity of the color. The darkest color value is 0 and the brightest is 255. Transparency is controlled by the addition of information to each element of the pixel data. A24-bit pixel value can be stored in 32bits. The extra 8 bits is for specifying transparency. This is sometime scaled the alpha channel. An ideal 8-bit alpha channel can support transparency levels from 0(completely transparent) to255 (completely opaque). It can be stored as part of the pixel data. Structure of digital images is discussed in the “An evaluation of Image Based Steganography Methods” by Kevin Curran of Internet Technologies Research Group [9]. Current techniques for embedding of messages into image carriers fall into three categories [4][7]:  Least-Significant Bit embedding (or simple embedding).  Advanced Least-Significant Bit embedding. 1300 | P a g e
  • 3. Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303 III. EXISTING METHODS 3.1 Least Significant Bit Embedding Least significant bit embedding technique is the most popular steganography technique. Depending upon the binary coding of the secret message it hides the message in the binary coded image. The below figure (a) depicts the knowledge of pixel values and secret messages. LSB makes changes in the image which are very easy to recognize and the stego images are easy to attack. Fig 1: Least Significant Bit Hiding Technique 3.1.1 Algorithm for LSB Method  Steps to Hide the Message Using the LSB Method.  Choose the proper image for the cover medium.  Scan the image row by row and encode it in to binary form.  Encode the secret message into binary notation.  Calculate the sizes of the image and secret message.  Consider one pixel of the image.  Segment the image into three parts (Red, Green and Blue parts)  Hide two by two bits of the secret message in each position of the pixel at the last two significant positions.  Set the image with the newly considered values.  Set the image and save it. 3.2 Advanced LSB Embedding The LSB method hides the secret text at the least two significant bits of the image pixels. Hence a change in the value of image pixels affects the image resolution, which ultimately leads to the reduction of image quality and make the image easy to attack. This LSB method is already attacked and broken. So in advanced LSB we are hiding the secret message based on searching about the identical values between the image pixels and secret messages. The image shown below gives a clear idea of arrangements of bits in the image pixel. Fig 2: Advanced Least Significant Bit Hiding Technique www.ijera.com www.ijera.com 3.2.1 Algorithm for Advanced LSB Method  Steps to Hide the Message Using the LSB Method.  Choose the proper image for the cover medium.  Scan the image row by row and encode it in to binary form.  Encode the secret message into binary notation.  Calculate the sizes of the image and secret message.  Consider one pixel of the image.  Segment the image into three parts (Red, Green and Blue parts)  Hide two by two bits of the secret message in each position of the pixel by searching the identical.  If the search is unsuccessful then hide two by two bits of the secret message in the least significant position of pixel image.  Store the positions of the hiding bits in a binary table.  Set the image with the newly considered values.  Set the image and save it. IV. PROPOSED METHOD when we consider all the existing techniques for steganography we come across with the facts that we are replacing the least significant bits of the pixel images with the bits of the secret message hence which ultimately leads to the downfall of the quality of the image .in the proposed method we are considering the RGB image and converting that image into binary form. While considering the secret message each character is represented with 8 bits. We will segment these 8 bits into 3 parts (3bits+3bits+2 bits). We will select an image pixel randomly using a random function and compare the equivalence of the message bits with the pixel image bits. When the case is identical we replace the bits with those identical. If the case is non- identical we will simply replace the bits with the least significant bits of the image pixel. So when we are selecting the pixel image randomly and hiding the total 8 bits in one single pixel image, we are providing a better image resolution as compared to existing models. 4.1 Algorithm for Proposed Method  Steps to Hide the Message Using the RGB LSB Method:  Choose the proper image for the cover medium.  Scan the image row by row and encode it in to binary form.  Encode the secret message into binary notation.  Calculate the sizes of the image and secret message.  Consider one pixel of the image randomly. 1301 | P a g e
  • 4. Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303        Segment the image into three parts (Red, Green and Blue parts). Segment the secret message into three parts (3bits, 3bits and 2bits). Hide the bits of the secret message in each position of the pixel by searching the identical. If the search is unsuccessful then hide the bits of the secret message in the least significant position of pixel image. Store the positions of the hiding bits in a binary table. Set the image with the newly considered values. Set the image and save it. S.No 1 2 3 4 5 6 7 8 9 V. www.ijera.com EXPERIMENTAL ANALYSIS The traditional LSB methods do not provide high capacity and flexibility to hide a whole character in a single pixel. Usually steganography is applied to normal images; by the segmentation technique we can provide higher level security to the secret message against steganalysis. Compared to the steganography used to hide the normal text, this proposed method provides rather better security with the use of cipher text. In total the analysis shows that the performance of the proposed method is much better than the existing methodologies. Table 1: Comparative Results Regular Original LSB 71.2131 71.2107 91.4541 91.4515 116.8887 116.8766 82.7183 82.7076 131.8025 131.799 101.9898 101.9865 105.4361 105.4215 91.9313 91.9226 18.9911 18.9803 Proposed RGB LSB 71.2133 91.454 116.8881 82.7182 131.8025 101.9898 105.4353 91.9305 18.9914 Fig 3: Original Images and its Histograms Fig 4: Regular LSB Embedded Images and its Histograms Fig 5: Proposed COLOR LSB embedded Images and its Histograms www.ijera.com 1302 | P a g e
  • 5. Koyi Lakshmi Prasad et al Int. Journal of Engineering Research and Applications ISSN : 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.1299-1303 The above results point up that the mean of proposed method values increased than original and regular LSB methods. When message is embedding in the image by using regular LSB method, message bits stored in pixels eight bit plane. Thus, the pixel value does not change well. Then mean value of image also not changed much and the value is relative to original image mean. When message is embedding in the image by using proposed RGB LSB method, Message bits of single character stored in single RGB pixel. So, pixel value changes a tiny than other embedding methods. Even though mean value of proposed method increases integrity of message and sturdiness of message security is enhanced. In total the analysis shows that the performance of the proposed method is much better than the current methodologies. VI. CONCLUSION In this paper a new steganography technique presented, analyzed and implemented. The proposed method hides the secret message based on comparing and searching the least significant bits of RGB image in an order of(3bits to R- component-3bits to Gcomponent-2bits to B- component)by which we can hide a single character in one pixel image, so that only appropriate number of pixel images are required to hide the secret message. While we are selecting a pixel image randomly, image will not get affected in the issues of resolution and clarity. The proposed method was compared with the LSB and advanced LSB methods which hide the data in least significant bits and identical bits. The proposed and LSB methods were used to implement stego image for the secret message on number of different images. The results of the proposed and LSB hiding methods were analyzed based on the mean of original image and embedded image. This paper conclude that that the proposed stegonography method is highly efficient, ace and accurate than the LSB methods which were proposed, it starts comparing and searching the identical bits in the pixel image and hides the data in it so that the resolution and quality of the images are never affected and keeps the message more secure. The experimental results also depict that the efficiency rate of the proposed method is relatively high when compared to the existing methods. [4] [5] [6] [7] [8] [9] [10] [11] www.ijera.com JinLiand Shawmin Lei, Sharp Laboratories of America. A Review of Data Hiding in Digital Images by Eugene T.Lin and Edward J.Delp, Video and Image Processing Laboratory (VIPER), School of Electrical and Computer Engineering, Purdue University, Indiana. On the limits of Steganography by Ross J.Anderson, FabienA. P. Petitcolas, IEEE Journal of selected areas in Communications, 16(4):474-481, May 1998. Special issue on Copyright & Privacy protection. ISSN0733-8716. Exploring Steganography: Seeing the Unseen by Neil F.Johnson, Sushil Jajodia, George Mason University. Steganography and the Art of hiding information by Vish Krishnan, Overland Park, K.S. Information hiding–a survey by Fabien A.P.Petitcolas, Ross J.Anderson & Markus G.Kuhn (Proceedings of the IEEE– special issue on protection of multimedia content, 87(7):1062-1078, July1999). An evaluation of Image Based Steganography Methods by Kevin Curran, Internet Technologies Research Group, University of Ulster Karen Bailey, Institute of Technology, Letter kenny, Ireland (International Journal of Digital Evidence). Secure Error-Free Steganography for JPEG Images by Yeuan-Kuen Lee, Ling-Hwei Chen, Department of Computer and Information Science, National Chiao Tung University,1001 Taiwan, R.O.C. Second international Conference on Industrial and Information Systems, ICIIS2007, 8– 11August, 2007, SriLanka339. New Steganography Technique for Palette Based Images by S.G.K.D.N.Samaratunge, University of Colombo School of Computing (UCSC), University of Colombo, Second International Conference on Industrial and Information Systems, ICIIS 2007, 8 – 11 August 2007, SriLanka. REFERENCES [1] [2] [3] A Discussion of Covert Channels and Steganography by Mark Owens, March19, 2002. Review on current Steganography technologies by S.G.K.D. N.Samaratunge, 7th International Information Technology Conference, 2005, SriLanka. An efficient color re-indexing scheme for palette based compression by Wenjun Zeng, www.ijera.com 1303 | P a g e