The internet has revolutionized all forms of communication since the beginning of its existence and serves an important role in data transmission and sharing. Since the rapid growth of internet, information privacy and security have become the most important issues in today’s world. Since the last 2 decades many information hiding techniques have been developed such as digital watermarking, Cryptography and Steganography. Watermarking is the process of embedding a message on a host signal. It has the additional requirement of robustness against possible attacks. A watermark can be either visible or invisible. Using digital watermarking, copyright information can be embedded into the multimedia data Information such the serial number, images or text with special significance can be embedded. The function of this information can be for copyright protection, secret communication, authenticity and distinguishing of data file, etc [1].
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document describes a proposed dual security image steganography technique using matrix partitioning. It involves three main steps: 1) partitioning a secret image into matrices to increase embedding capacity, 2) scrambling secret data bits by replacing the most significant bits instead of least significant bits to provide an additional level of security, and 3) embedding the secret data into a cover image in the spatial domain using least significant bit substitution. The technique can embed grayscale or color images, messages, or images with messages into grayscale or color cover images of any size for enhanced security beyond typical steganography. Diagrams illustrate the embedding and extraction processes.
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
The secure data transmission over internet is achieved using Steganography. In this paper High Capacity and Security Steganography using Discrete wavelet transform (HCSSD) is proposed. The wavelet coefficients of both the cover and payload are fused into single image using embedding strength parameters alpha and beta. The cover and payload are preprocessed to reduce the pixel range to ensure the payload is recovered accurately at the destination. It is observed that the capacity and security is increased with acceptable PSNR in the proposed algorithm compared to the existing algorithms
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
1. The document discusses new and unconventional techniques in pictorial steganography and steganalysis. It introduces MPSteg-color, a new steganographic technique that hides messages in color image coefficients obtained through image decomposition, making the messages harder for steganalysts to detect.
2. The document also proposes a methodology for comparing different steganalysis techniques. An empirical evaluation of four steganalysis algorithms showed that their performance is highly dependent on the training and testing images used.
3. Two targeted steganalysis techniques designed to detect messages hidden using MPSteg-color are also introduced. One detects blocking artifacts introduced during embedding, while the other analyzes histograms of the decomposition
This document summarizes a research paper on applying steganography techniques for data security. Specifically, it hides encrypted messages within digital images using the dynamic cell spreading technique (DCS) and the RC4 encryption algorithm. The document discusses DCS and RC4 in detail and evaluates the success of hiding encrypted messages in several test images without noticeable quality degradation. It concludes that DCS combined with RC4 encryption provides an effective method for hidden communication and data security.
LSB Based Image Steganography for Information Security Systemijtsrd
Information hiding in a cover file is one of the most modernized and effective ways for transferring secret message from sender to receiver over the communication channel. There are many steganographic techniques for hiding secret message in image, text, audio, video and so on. Image Steganography is also one of the common methods used for hiding the information in the cover image. In this research work, the secret message is hidden in a cover image file using image steganography. LSB is very efficient algorithm used to embed the information in a cover file. The LSB based image steganography with various file sizes is analyzed and illustrated their results. Bitmap .bmp image is used as a cover image file to implement the proposed system. The detail Least Significant Bit LSB based image steganography is introduced. In this paper, the new embedding algorithm and extracting algorithm are presented. While embedding the secret message in a cover image file, the starting embedded pixel is chosen according to public shared key between sender and receiver. The original cover image and embedded image with secret message are analyzed with PSNR values and SNR values to achieve security. The resulting embedded image shows the acceptable PSNR and SNR values while comparing with the original cover image. The proposed system can help the information exchanging system over communication media. Aung Myint Aye "LSB Based Image Steganography for Information Security System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-1 , December 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18995.pdf
http://www.ijtsrd.com/computer-science/computer-security/18995/lsb-based-image-steganography-for-information-security-system/aung-myint-aye
Hiding Text within Image Using LSB ReplacementIOSR Journals
The document proposes a new algorithm for hiding text within a gray image using least significant bit (LSB) replacement with increased security. The algorithm generates a random key between 1-256 to encrypt the text before embedding it in the image. It uses XOR and AND logic operations to modify the LSB of pixel values and embed the encrypted text. Experimental results show the embedded text can be concealed within the image while maintaining high image quality with PSNR values over 75dB. The algorithm aims to improve upon basic LSB techniques by adding an encryption step using a random key to enhance security of the hidden text.
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
Least-Significant-Bit (LSB) is one of the popular and frequently used steganography techniques to hide a secret message in a digital medium. Its popularity is due to its simplicity in implementation and ease of use. However, such simplicity comes with vulnerabilities. An embedded secret message using the traditional LSB insertion is easily decodable when the stego image is suspected to be hiding a secret message. In this paper, we propose a novel secure and high quality LSB embedding technique. The security of the embedded payload is employed through introducing a novel quadratic embedding sequence. The embedding technique is also text dependent and has non-bounded inputs, making the possibilities of decoding infinite. Due to the exponential growth of and quadratic embedding, a novel cyclic technique is also introduced for the sequence that goes beyond the limits of the cover medium. The proposed method also aims to reduce the noise arising from embedding the secret message by reducing bits changed. This is done by partitioning the cover medium and the secret message into N partitions and artificially creating an assignment problem based on bit change criteria. The assignment problem will be solved using the Hungarian algorithm that will puzzle the secret message partition for an overall least bit change.
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
This document describes an implementation of image steganography that uses two techniques - Five Modulus Method (FMM) and Least Significant Bit (LSB) substitution - to hide a secret image within a cover image. The secret image is divided into two halves, with the upper half embedded using FMM and the lower half using LSB substitution. A private stego-key is also used during embedding to make detection of the secret image more difficult. The quality of the embedded and extracted images is evaluated using PSNR and MSE metrics, with the results showing good visual quality.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
A Review paper on Steganography TechniquesEditor IJMTER
In today’s world the art of sending & displaying the hidden information especially in
public places, has received more attention. And so it has to face many challenges. Therefore,
different methods have been developed so far for hiding information in different cover media.
Steganography is the art and science of invisible communication which takes place between two
different entities. This is done by hiding the information in other information. It is the way of hiding
the existence of the communicated information. Steganography is often confused with cryptography
because the two are similar in the way that they both are used to protect confidential information.
Steganography is different from cryptography. Cryptography focuses on keeping the contents of a
message secret, while steganography focuses on keeping the existence of a message secret [4]. This
paper intends to give an overview of security systems with a main concentration on steganography,
its uses and techniques.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
The document discusses combining cryptography and steganography to securely transmit secret messages. It proposes encrypting a secret image using DES encryption and hiding the encrypted image in the least significant bits of cover images. The algorithm and block diagrams for encryption, embedding, retrieval and decryption are described. Experimental results comparing embedding in the 1st-2nd vs 3rd-4th least significant bits are shown, with the former being less perceptible. The conclusion is that combining cryptography and steganography increases security, and the encrypted images can be accurately retrieved and decrypted.
Image steganography is the art of hiding information within digital images. The document discusses various techniques for image steganography including LSB (least significant bit) and DCT (discrete cosine transform). LSB is a simple spatial domain technique that replaces the least significant bits of image pixels with bits of a secret message. DCT operates in the frequency domain by transforming image blocks and hiding data in the mid-frequency DCT coefficients. The document compares the advantages and disadvantages of these techniques, and discusses their applications for hiding private information or digital watermarking. Metrics for analyzing steganography systems like bit error rate, mean square error, and peak signal to noise ratio are also introduced.
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
Steganography is the art of hiding a digital media with another digital media, it is very important to transmit a secret data from place to another because if any one intercept the data during the transmission he can't know if there is a data a data or not. This paper shows a new method to hide a secret data in an image without any bit change of the stego image that means the PSNR value between the original image and stego image equal to Infinity. The size of the secret message that can be hidden in the image is infinity or unlimited. This method based on generating a dynamic symmetric key between the sender and the receiver, it is used for encoding and decoding process and it is derived from the image and the secret message together.
This document discusses an adaptive pixel value differencing (PVD) based secret data hiding technique. It begins with an introduction to steganography and some common steganography techniques. The proposed method aims to embed most data into edged areas of an image since there are larger pixel differences, increasing embedding capacity. It implements a PVD-based embedding and extraction algorithm. Experimental results on Lena and Baboon images show increased payload and acceptable stego image quality compared to LSB substitution. The proposed method effectively and efficiently embeds hidden information imperceptibly into cover images.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Image Steganography Techniques: An OverviewCSCJournals
Steganography is one of the methods used for the hidden exchange of information. It is the art and science of invisible communication, which strives to hide the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. These techniques are analyzed and discussed in terms of their ability to hide information in image files, the amount of the information that can be hidden, and the robustness to different image processing attacks.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document summarizes a research paper that proposes a dual security image steganography technique using matrix partitioning. The technique has three stages: 1) It partitions a secret image into matrices to increase embedding capacity. 2) It scrambles secret data bits by replacing the most significant bits instead of least significant bits to provide another level of security. 3) It uses least significant bit steganography to conceal grayscale or color images, messages, or images with messages into grayscale or color cover images of any size. The technique aims to improve security over traditional steganography by partitioning and scrambling the secret data before embedding. Simulation results showed the proposed algorithm had better performance than other techniques.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
This document describes an implementation of image steganography that uses two techniques - Five Modulus Method (FMM) and Least Significant Bit (LSB) substitution - to hide a secret image within a cover image. The secret image is divided into two halves, with the upper half embedded using FMM and the lower half using LSB substitution. A private stego-key is also used during embedding to make detection of the secret image more difficult. The quality of the embedded and extracted images is evaluated using PSNR and MSE metrics, with the results showing good visual quality.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
The document summarizes an improved steganography technique called Bit Plane Complexity Segmentation (BPCS) Steganography. BPCS overcomes limitations of traditional techniques by hiding secret data in the bit-planes of an image vessel. It takes advantage of the human vision system's inability to perceive shape information in complicated binary patterns. The technique replaces noise-like regions of the image bit-planes with secret data without deteriorating image quality. The document describes the BPCS technique, including segmenting images into informative and noise regions, hiding data in the noise regions, and techniques to increase hiding capacity such as conjugating less complex data blocks. It also proposes a web-based BPCS system to provide improved data security and prevent hacking
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
Steganography is an important area of research in information security. It is the technique of disclosing information into the cover image via. text, video, and image without causing statistically significant modification to the cover image. Secure communication of data through internet has become a main issue due to several passive and active attacks. The purpose of stegnography is to hide the existence of the message so that it becomes difficult for attacker to detect it. Different steganography techniques are implemented to hide the information effectively also researchers contributed various algorithms in each technique to improve the technique’s efficiency. In this paper we do a brief analysis of different spatial domain image stegnography techniques and their comparison. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected.
A Review paper on Steganography TechniquesEditor IJMTER
In today’s world the art of sending & displaying the hidden information especially in
public places, has received more attention. And so it has to face many challenges. Therefore,
different methods have been developed so far for hiding information in different cover media.
Steganography is the art and science of invisible communication which takes place between two
different entities. This is done by hiding the information in other information. It is the way of hiding
the existence of the communicated information. Steganography is often confused with cryptography
because the two are similar in the way that they both are used to protect confidential information.
Steganography is different from cryptography. Cryptography focuses on keeping the contents of a
message secret, while steganography focuses on keeping the existence of a message secret [4]. This
paper intends to give an overview of security systems with a main concentration on steganography,
its uses and techniques.
Image steganography using least significant bit and secret map techniques IJECEIAES
The document proposes an image steganography technique that uses least significant bit (LSB) substitution and secret maps. It utilizes 3D chaotic maps, specifically 3D Chebyshev and 3D logistic maps, to generate secret keys for the secret map and to permute secret data before embedding. The secret map controls pixel selection in the cover image for hidden data insertion. Evaluation shows the approach satisfies criteria like imperceptibility and security against attacks, with good hiding capacity, quality, and accuracy compared to previous methods.
Steganography is a technique for hiding secret information within ordinary digital files so that the very existence of the hidden information is concealed. It works by replacing bits of redundant data within image, audio, or video files with bits of the secret message. This allows secure communication of hidden information in a way that avoids detection. The document discusses the history and benefits of steganography, providing examples of its use throughout history for covert communication. It also introduces some key concepts and terminology used in modern steganography.
The document discusses combining cryptography and steganography to securely transmit secret messages. It proposes encrypting a secret image using DES encryption and hiding the encrypted image in the least significant bits of cover images. The algorithm and block diagrams for encryption, embedding, retrieval and decryption are described. Experimental results comparing embedding in the 1st-2nd vs 3rd-4th least significant bits are shown, with the former being less perceptible. The conclusion is that combining cryptography and steganography increases security, and the encrypted images can be accurately retrieved and decrypted.
Image steganography is the art of hiding information within digital images. The document discusses various techniques for image steganography including LSB (least significant bit) and DCT (discrete cosine transform). LSB is a simple spatial domain technique that replaces the least significant bits of image pixels with bits of a secret message. DCT operates in the frequency domain by transforming image blocks and hiding data in the mid-frequency DCT coefficients. The document compares the advantages and disadvantages of these techniques, and discusses their applications for hiding private information or digital watermarking. Metrics for analyzing steganography systems like bit error rate, mean square error, and peak signal to noise ratio are also introduced.
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
Steganography is the art of hiding a digital media with another digital media, it is very important to transmit a secret data from place to another because if any one intercept the data during the transmission he can't know if there is a data a data or not. This paper shows a new method to hide a secret data in an image without any bit change of the stego image that means the PSNR value between the original image and stego image equal to Infinity. The size of the secret message that can be hidden in the image is infinity or unlimited. This method based on generating a dynamic symmetric key between the sender and the receiver, it is used for encoding and decoding process and it is derived from the image and the secret message together.
This document discusses an adaptive pixel value differencing (PVD) based secret data hiding technique. It begins with an introduction to steganography and some common steganography techniques. The proposed method aims to embed most data into edged areas of an image since there are larger pixel differences, increasing embedding capacity. It implements a PVD-based embedding and extraction algorithm. Experimental results on Lena and Baboon images show increased payload and acceptable stego image quality compared to LSB substitution. The proposed method effectively and efficiently embeds hidden information imperceptibly into cover images.
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYJournal For Research
Steganography is the art and science of hiding the actual important information under graphics, text, cover file etc. These techniques may be applied without fear of image destruction because they are more integrated into the image. Information can be in the form of text, audio, video. The purpose of steganography is to covert communication and to hide a message from a third party or intruder. Steganography is often confused with cryptography because the two are similar in the way that both are used to protect confidential information. Though there are many types of steganography, video Steganography is more reliable due to high capacity image, more data embedment, perceptual redundancy etc. This research paper deals with various Video Steganography techniques and algorithms including Spatial Domain, Pseudorandom permutations, TPVD (Tri-way pixel value differencing), Motion Vector Technique, Video Compression, and Motion Vector Technique. The Video compression which uses modern coding techniques to reduce redundancy in video data has been also studied and analyzed. In fact, Video compression operates on square-shaped groups or blocks of neighboring pixels, often called macro blocks. These pixel groups or blocks of pixels are compared from one frame to the next and the video compression code sends only the differences within those blocks. Generally, the motion field in video compression is assumed to be translational with horizontal component and vertical component and denoted in vector form for the spatial variables in the underlying image, such as three steps search, etc. The study also discusses and focusses on the evolution of the Video Steganography techniques and algorithms over the years based on its application and subsequent merits and demerits. Further, Advanced Video Steganography Algorithm/Bit Exchange Method based on the bit shifting and XOR operation in the secret message file has been studied and implemented. The encrypted secret message is embed in the cover file in alternate byte. The bits are substituted in LSB & LSB+3 bits in the cover file. Finally, the simulation and evaluation of the above mentioned approach is performed using MATLAB tools.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Image Steganography Techniques: An OverviewCSCJournals
Steganography is one of the methods used for the hidden exchange of information. It is the art and science of invisible communication, which strives to hide the existence of the communicated message. In this way, if successfully it is achieved, the message does not attract attention from eavesdroppers and attackers. Using steganography, information can be hidden in different embedding mediums, known as carriers. These carriers can be images, audio files, video files, and text files. The focus in this paper is on the use of an image file as a carrier, and hence, the taxonomy of current steganographic techniques for image files has been presented. These techniques are analyzed and discussed in terms of their ability to hide information in image files, the amount of the information that can be hidden, and the robustness to different image processing attacks.
This paper presents a general overview of the steganography. Steganography is the art of hiding the very presence of
communication by embedding secret messages into innocuous looking cover documents, such as digital images. Detection of
steganography, estimation of message length, and its extraction belong to the field of steganalysis. Steganalysis has recently received a
great deal of attention both from law enforcement and the media. In this paper review the what data types are supported, what methods
and information security professionals indetecting the use of steganography, after detection has occurred, can the embedded message
be reliably extracted, can the embedded data be separated from the carrier revealing the original file, and finally, what are some
methods to defeat the use of steganography even if it cannot be reliably detected.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...ijtsrd
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed
A Comparitive Analysis Of Steganography Techniquestheijes
With the increase in rate of unauthorized access and attacks security of confidential data is important. Now a day Cryptography and Steganography are the secure communication media for security purposes. This paper focuses on quantitative comparision of steganography technique such as improved LSB technique for RGB images, pattern based steganography technique and raster scan technique. The simulation has been done on MATLAB 2013 using 20 images and output of few has been shown in this paper. It has been concluded that the on the basis of various factors such as quantitative measures of the three techniques, pattern based steganography technique is the best among the other techniques w.r.t to security , irrespective of the fact that this technique has low capacity.
A Survey Paper On Different Steganography TechniqueJeff Brooks
This document summarizes a survey paper on different steganography techniques. It begins by defining steganography and its types such as linguistic, image, network, video, audio, and text steganography. It then focuses on least significant bit (LSB) steganography, explaining how it works by replacing the LSB of image pixel values with secret message bits. The paper compares the histograms of cover and stego images, showing they are almost identical. It discusses the advantages of steganography and concludes by analyzing steganography methods and suggesting areas for future work such as increasing embedding capacity while maintaining secrecy.
DUAL SECURITY USING IMAGE STEGANOGRAPHY BASED MATRIX PARTITIONIJNSA Journal
This document summarizes a research paper that proposes a dual security image steganography technique using matrix partitioning. The technique has three stages: 1) It partitions a secret image into matrices to increase embedding capacity. 2) It scrambles secret data bits by replacing the most significant bits instead of least significant bits to provide another level of security. 3) It uses least significant bit steganography to conceal grayscale or color images, messages, or images with messages into grayscale or color cover images of any size. The technique aims to improve security over traditional steganography by partitioning and scrambling the secret data before embedding. Simulation results showed the proposed algorithm had better performance than other techniques.
This document proposes an improved steganography approach using color-guided channels in digital images. It begins with an introduction to steganography and discusses how it can be used to hide secret data or messages within cover objects like images, video, or audio files. The proposed method embeds data into a color image's RGB channels. It first converts the secret message to a binary bit stream and compresses it using run length encoding. The data is then embedded directly into the LSBs of some channels and indirectly into other channels by encoding counts. This approach aims to improve the visual quality of the stego image and have higher embedding capacity compared to existing methods.
The document proposes a new algorithm for hiding an image within a video clip. The algorithm embeds the first and second rows of the image into the first and last rows of each video frame. It does this for the red, green, and blue color channels. To extract the image, it takes the first and last rows of each frame and reconstructs the first two rows of the embedded image. The algorithm was implemented in MATLAB. Experimental results showed the hidden image was visually indistinguishable from the original video and had improved image quality compared to other methods. PSNR values between 30-31 dB demonstrated the effectiveness of the proposed approach.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
The document presents an algorithm for detecting hidden messages in PNG images based on fuzzy logic techniques. It discusses steganography and steganalysis techniques such as LSB substitution and discusses their limitations in detecting hidden data in PNG files. The proposed system uses fuzzy logic for classifying images as clean or containing hidden messages. Experimental results show the fuzzy logic system achieved high performance in classifying PNG images.
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
The information security has become one of the most significant problems in data communication. So it
becomes an inseparable part of data communication. In order to address this problem, cryptography and
steganography can be combined. This paper proposes a secure communication system. It employs
cryptographic algorithm together with steganography. The jointing of these techniques provides a robust
and strong communication system that able to withstand against attackers. In this paper, the filter bank
cipher is used to encrypt the secret text message, it provide high level of security, scalability and speed.
After that, a discrete wavelet transforms (DWT) based steganography is employed to hide the encrypted
message in the cover image by modifying the wavelet coefficients. The performance of the proposed system
is evaluated using peak signal to noise ratio (PSNR) and histogram analysis. The simulation results show
that, the proposed system provides high level of security.
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
This document summarizes a research paper that proposes a new steganalysis algorithm for detecting hidden messages in PNG images using fuzzy logic techniques. The paper begins with an introduction to steganography and steganalysis. It then provides an overview of common steganography techniques such as LSB substitution and discusses existing steganalysis methods. The paper proposes a steganalysis system for PNG images based on fuzzy logic and evaluates its performance at classifying images as clean or containing hidden messages compared to other artificial intelligence techniques.
This document summarizes a research paper that proposes a novel two-layer security mechanism combining cryptography and steganography techniques. The paper begins with an introduction discussing security issues with traditional cryptography and steganography methods. It then reviews related work in the fields. The proposed approach encrypts a secret message using AES encryption, splits the cipher file into frames, and embeds the cipher text in video frames using DCT-based steganography. Experimental results show the proposed approach achieves higher PSNR quality measurements than an existing HLSB technique, indicating better quality of stego frames. In addition, the proposed approach does not change file sizes compared to another existing approach.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
Steganography is the art of hiding confidential information (secret) within any media file (cover media) to
produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or
recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling
recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to
develop more secure steganography algorithms. This paper presents a detailed description of a new secure
Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a
binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly
generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then
utilizes the Least-Significant-Bit (LSB) approach to embed the permuted binary sequence into BMP image
file. The algorithm performance is investigated through performing a number of experiments, and for each
experiment the PSNR (Peak Signal-to-Noise Ratio) between the stego and cover images is calculated. The
results show that the algorithm provides high image quality, and invisibility, and most importantly higher
security as secret cannot be recovered without knowing the permutation, which has a complexity of O(N!),
where N is the length of the permutation.
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
This document summarizes a research paper that proposes a steganographic method for hiding encrypted messages in the least significant bits of image pixels. The method analyzes the cover image to determine the statistical distribution of the least significant two bits per pixel. It then encrypts the message using a chaotic Bernoulli map and selects the encrypted frame that is most statistically similar to the cover image for substitution. The full paper implements and tests the method in MATLAB, finding that substituting a more similar encrypted frame leads to better statistical properties in the resulting stego-image compared to a less similar frame.
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
An important topic in the exchange of confidential messages over the internet is the security of information conveyance. For instance, the producers and consumers of digital products are keen to know that their products are authentic and can be differentiated from those that are invalid. The science of encryption is the art of embedding data in audio files, images, videos or content in a way that would meet the above security needs. Steganography is a branch of data hiding science which aims to reach a describe level of security in the exchange of private military and commercial data which is not clear. This system is proposed to hide the text information files within the image based on the LSB method in order to meet security requirement such as confidential and integrity. The least significant bit is the bit which is farthest to the right and holds the least value in a multi bit binary number. This system is implemented by using C programming. Win Win Maw | San San Lwin "Text Embedded System using LSB Method" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26696.pdf Paper URL: https://www.ijtsrd.com/engineering/information-technology/26696/text-embedded-system-using-lsb-method/win-win-maw
Public key steganography using lsb method with chaotic neural networkIAEME Publication
This document summarizes a research paper that proposes a public key steganography method using least significant bit (LSB) insertion with a chaotic neural network. The method embeds a secret image into a cover image using LSB insertion with a public chaotic map-generated key. A chaotic neural network is then used to merge the cover and secret images. The document provides background on steganography, chaotic maps, neural networks, and LSB insertion. It also reviews related work using neural networks for steganography and iris image protection.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
This document reviews and compares various image steganography techniques that have been proposed by researchers. It begins with defining steganography as hiding communication to prevent detection by enemies. Image steganography techniques hide data in digital images by modifying pixel values. The document evaluates techniques based on invisibility, payload capacity, robustness, file format independence, and image quality using PSNR. Several literature examples are reviewed, including techniques using integer wavelet transform, bit plane complexity analysis, data compression prior to embedding, and transformations like DCT and Arnold transform for increased security. Overall the document provides an overview of image steganography concepts and a comparative analysis of different proposed techniques.
Similar to Securing Web Communication Using Three Layer Image Shielding (20)
The document discusses a case study of using Apache Spark to improve data processing speed. An organization was processing pharmaceutical data batches containing up to 1 billion records, which previously took 2.2 hours using a 5 node Vertica cluster. By migrating to a 3 node Apache Spark cluster on AWS, processing time was reduced by 62%, taking only 1 hour to process 1.2 billion records. Key steps taken included ingesting data into DataFrames, replacing procedures with UDFs, using Spark SQL and partitioning the DataFrame to perform parallel processing across nodes.
Traditional power grid can be upgraded into smart grids by incorporating two-way integrated communications and smart computing capabilities for improved efficiency, reliability and decision support.
Dense wavelength division multiplexing (DWDM): A Review Kamal Pradhan
it is clear that as we approach the 21st century the remarkable revolution in information services has
permeated our society. This rapid growth of information technology has led to new services hungry for transmission
capacity. Communication, which in the past was confined to narrowband voice signals, now demands a high quality
visual, audio, and data context for services such as Voice over-Internet protocol (VoIP), video streaming,
broadcasting of TV programmes, high-speed file sharing, E-commerce and E-Governance need a transmission
medium with very high bandwidth capabilities for handling vast amounts of information. The telecommunications
industry, however, is struggling to keep pace with these changes. Earlier predictions were made that current fiber
capacities would be adequate for our needs into the next century but they have been proven wrong but these fiber-
optics, with its comparatively infinite bandwidth and by employing the latest multiplexing technique, i.e. Dense
Wavelength Division Multiplexing (DWDM) has proven to be the solution.
Mathematical modeling and parameter estimation for water quality management s...Kamal Pradhan
This report describes various problem solving techniques in mathematical modeling for calculating various parameters of water e.g. temperature, pH, Dissolved oxygen. A mathematical model provides the ability to predict the contaminant concentration levels of a river. Here we are using an advection-diffusion equation as our mathematical model. The numerical solution of equation is calculated using Matlab & Mathematica. Parameter estimation is necessary in water modeling to predict the different parameters of water at different point with minimal errors. So here we use 2D & 3D interpolation technique for parameter estimation.
Android Operated Wireless Robot Using 8051 MCUKamal Pradhan
This document is a certificate certifying that Kamal Pradhan completed a project report entitled "Android Controlled Wireless Robot Using 8051(AT89S52) Micro controller" under the guidance of Mr. Santanu Kumar Dash for the 2013-2014 session. The project report fulfills the necessary requirements and regulations for submission. Kamal Pradhan thanks various people who helped with the project including his guide Mr. Dash and director Prof. S.S. Pujari.
Color based image processing , tracking and automation using matlabKamal Pradhan
Image processing is a form of signal processing in which the input is an image, such as a photograph or video frame. The output of image processing may be either an image or, a set of characteristics or parameters related to the image. Most image-processing techniques involve treating the image as a two-dimensional signal and applying standard signal-processing techniques to it. This project aims at processing the real time images captured by a Webcam for motion detection and Color Recognition and system automation using MATLAB programming.
In color based image processing we work with colors instead of object. Color provides powerful information for object recognition. A simple and effective recognition scheme is to represent and match images on the basis of color histograms.
Tracking refers to detection of the path of the color once the color based processing is done the color becomes the object to be tracked this can be very helpful in security purposes.
Automation refers to an automated system is any system that does not require human intervention. In this project I’ve automated the mouse that work with our gesture and do the desired tasks.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Securing Web Communication Using Three Layer Image Shielding
1. International Journal of Computer Applications (0975 – 8887)
International Conference in Distributed Computing & Internet Technology (ICDCIT-2014)
8
Securing Web Communication using Three Layer Image
Shielding
Kamal Pradhan
Student, B. Tech in Computer Science and
Engineering
Sambalpur University Institute Of Information
Technology, Sambalpur, Odisha, India.
kamal.pradhan@suiit.ac.in
Gaurav Gohil
Student, Master of Computer Application
Sambalpur University Institute Of Information
Technology,
Sambalpur, Odisha, India.
gourav.gohil@suiit.ac.in
ABSTRACT
Communication security has taken an important role with the
advancement in digital communication. The difficulties in
ensuring an individual’s privacy has become increasingly
challenging. Techniques such as digital watermarking,
cryptography and Steganography are used for information
hiding. This paper introduces a new Steganography algorithm to
hide data inside images using three layer image shielding.
Steganography is the art and science of hiding the existence of
data in another transmission medium. It helps in achieving a
secure and safe communication. The proposed algorithm uses
spatial domain Steganography technique in the transformed
color space. Here the three layers RGB (red, green, blue) of the
cover image are transformed to HSV (hue, saturation, value)
layers. The pixels of any two HSV layers are used to embed the
message inside it. The remaining layer act as an indicator to
store and retrieve the message from the other two layers
efficiently. The final image is the stego image. Different sizes of
data are stored inside the images and the PSNR (Peak signal-to-
noise ratio) is also captured for each of the tested images. Based
on the PSNR value of tested images, the stego image has a
higher PSNR value.
Keywords
Steganography, Spatial domain, PSNR, Cover image, Stego
image.
1. INTRODUCTION
The internet has revolutionized all forms of communication
since the beginning of its existence and serves an important role
in data transmission and sharing. Since the rapid growth of
internet, information privacy and security have become the most
important issues in today’s world. Since the last 2 decades many
information hiding techniques have been developed such as
digital watermarking, Cryptography and Steganography.
Watermarking is the process of embedding a message on a host
signal. It has the additional requirement of robustness against
possible attacks. A watermark can be either visible or invisible.
Using digital watermarking, copyright information can be
embedded into the multimedia data Information such the serial
number, images or text with special significance can be
embedded. The function of this information can be for copyright
protection, secret communication, authenticity and
distinguishing of data file, etc [1].
Cryptography is the art of hiding the contents of a message from
an attacker, but it doesn’t hide the existence of the message.
Cryptography’s main task is to ensure that, users are able to
communicate securely over an insecure channel. This
communication however must ensure the transmission’s privacy
and authenticity [2]. Steganography is the art and science of
invisible communication. It is accomplished through hiding of
information within other information, thus hiding the presence
of the communicated information [3]. The word Steganography
is derived from the Greek words “stegos” meaning “cover” and
“grafia” meaning “writing” defining it as “covered writing”. In
image Steganography the information is hidden completely in
images [4].The idea and practice of hiding information has a
long history. In the pages of history the Greek historian
Herodotus writes of a nobleman, Histaeus, who needed to
communicate with his son in law in Greece. He shaved the head
of one of his most trusted slave and tattooed the message onto
the slave’s scalp. When the slaves’ hair grew back the slave was
dispatched with the hidden message [5]. In the Second World
War the micro dot technique was developed by the Germans [6].
Both Steganography and digital watermarking employ
Steganography techniques to embed data covertly in noisy
signals. But whereas Steganography aims for imperceptibility to
human senses, digital watermarking tries to control the
robustness as top priority. Steganography and cryptography are
the art of hiding information without detection, both of them
belong to the same family, cryptography scrambles a message so
that it cannot be read. Steganography just hides it not to attract
attention and this is the advantage that Steganography takes over
cryptography.
This paper is structured in using the following format: Section 2
discusses the related works followed by our proposed algorithm
in section 3. The experimental results of this algorithm are
presented in section 4. Finally we conclude the work in section
6.
2. Related works
The image Steganography can be broadly divided into two
categories namely spatial domain and frequency domain. In each
of these categories we can have adaptive and dynamic methods.
Adaptive methods are based upon image based statistics where
as dynamic methods are message bit dependent [7]. Generally,
for hiding information inside images least significant bit (LSB)
method is used. This method does not increase the size of file
but if size of information is increased the file fidelity degrades.
Gutub et al [13] describes the pixel indicator technique where
one channel is used to locate the channel to store data. There
have been many statistical techniques developed to determine if
an image has been subjected to LSB embedding [10] [11] [6].
Problems with existing methods that embed within the palette
are that they do not take into account other important color
models. Also, the information is limited and the hidden message
can be destroyed by switching the order of the palette [9][8]. To
overcome this we can use palette based images to embed
2. International Journal of Computer Applications (0975 – 8887)
International Conference in Distributed Computing & Internet Technology (ICDCIT-2014)
9
information inside them using different color models [8].
Palette-based images are used as cover images to provide a
secure and fast transmission/storage over a communication
system. Palette-based images are largely available on the
Internet. Due to their abundance over the Internet, it is difficult
to find a suspicious stego-image [8] [9]. A color image can be
illustrated in a different color model [9].The purpose of color
models is to organize colors in a standard form. Different
models are used according to the user’s need. These models are
divided in two models: hardware oriented and color
manipulation. The color models include RGB, CMY, CMYK,
HSI, HSV, RGB and YIQ [8]. Palette based Steganography
hides the Steganography message within the bits of the palette
and the indices. Care must be taken while using this image file
format ensuring that the number of colors is not exceeded.
Examples of this form of embedding are BPCS and EzStego [9]
but these algorithms are weak against visual attacks and
steganlysis due to more distortion. Agaian and Perez [9]
presented a new windowing technique for embedding messages
in palette/color-map based images. This new method has the
advantage of embedding secure data, within the index, the
palette or both, using special sorting scheme. El-Emam [14], on
the other hand, proposed a steganography algorithm to hide a
large amount of data with high security. His Steganography
algorithm is based on hiding a large amount of data (image,
audio and text) file inside a color bitmap (bmp) image.
According to his research, the image would be filtered and
segmented where bit replacement is used on the appropriate
pixels. Gandharba and Saroj[7], proposed an algorithm that
divides the RGB image into 8 blocks and embeds the encrypted
cipher text inside the 8 blocks in a regular pattern which
provides an extra layer of security. Parvez and Gutub [15],
proposed an algorithm that uses actual color of the channel to
decide no of data bits to store. This approach leads to very high
capacity with low visual distortion.
In this work, we propose a new Steganography algorithm which
uses a palette based RGB image as our cover image. The RGB
image is first transformed to HSV image and then Value and
Saturation layers are divided into 4 non overlapping blocks. The
information is hidden into two of the layers of HSV image in a
spiral matrix form and the third layer act as the index or the
pixel indicator of the stored data. The whole data is secured by
stego key which is embedded in one of the block Hue or
Saturation layer.
3. Proposed algorithm
In this section we propose an algorithm called three layer image
shielding that hides large volumes of information inside an
image with minimal degradation and high security. Here the
three layers refer to a security protocol by which the stego image
is generated. The first layer is our stego key layer which is
common in all Steganography algorithms and this key gives us
the access to the hidden information inside the images. The
second layer is the encrypted code layer here the information is
first converted into unique encrypted codes using a cryptography
algorithm which can be decoded by the algorithm in receivers
end. The third and the most important layer is our HSV palettes
where the encrypted codes are embedded inside the two layers
mainly saturation and value of HSV by changing a specific bit
which uses spatial domain technique of Steganography. These
layers prevent the image steganalysis and statistical attacks. The
HSV image comprises of three layers Hue, Saturation and value.
Hue describes the true color properties and Saturation describes
strength or dominance of Hue. Value describes the overall
intensity to how light or dark a color is [12]. Fig 1 shows the
cylindrical model of HSV color space we can see here how the
hue saturation and value change their properties. The value of
Hue varies from 0o to 360o and the Saturation and value ranges
from 0 to1.
Fig 1: Cylindrical HSV color model
The information is stored in the Saturation and Value layer
because minor changes here are schemes to be undetectable
by the human visual system (HVS). The changes made in
Hue layer affects the true color directly so we use the Hue
layer for Pixel indication where minor changes are made
to the bit. The saturation and value layer are divided into 4 non
overlapping blocks of different sizes the blocks are S1,S2,S3,S4
and V1,V2,V3,V4 the information is stored in the 6 blocks
S1,S2,S3 and V1,V2,V3 and the other two blocks S4 and V4
store the stego key, no of changed bits, the index of the pixels
where our algorithm starts and stops and the meta information
about encoded message. The Hue layer which is subject to minor
change stores the index and act as an indicator for the pixel to be
selected.
Our algorithm is divided into two parts as followed a: sender’s
end where the information is embedded into image and b:
receivers end where the information is retrieved are discussed in
sub sections 3.1 and 3.2.
3.1. Information embedding algorithm
First the RGB image is converted into HSV image using
color space transformation.
The three layers Hue, Saturation and value are extracted
from the HSV image these layers are in form of 2D matrix.
The saturation and value layers are divided into 4 non
overlapping blocks and the hue layer remains as it is. Fig 2.1
shows the three layers and how the blocks are divided.
Fig 2.1: Different layers of HSV image after extraction
The input message is now converted into encrypted codes
using a cryptography algorithm. Let the input message be
“Steganography is better”.
3. International Journal of Computer Applications (0975 – 8887)
International Conference in Distributed Computing & Internet Technology (ICDCIT-2014)
10
Input message and encrypted codes.
The blue boxes show the input message and the black box
refers to the space between two corresponding words the
encrypted codes are decimal numbers.
Once we have generated the encrypted code from the input
message then we start embedding the encrypted codes into
blocks of the Saturation and Value layer of the HSV image
and add the corresponding index to the Hue layer.
Let’s take first 3 characters of the word “Steganography”
i.e. “Ste” to be embedded in the Saturation layer and to add
the index in Hue layer an encrypted code is only embedded
when the value of the three layers is in between 0.1500 -
0.9500 else we leave them as they are because when the
HSV image is converted to RGB after embedding the
information to produce stego image the color
transformation algorithm rounds off extreme value so to
make our algorithm secure we embed the values in given
range. Fig 3: shows how “ste” are embedded inside the
pixels.
Fig 2.2: Embedding messages into HSV
In Fig 2.2 we can see pixel of RGB image after the
transformation of image we get the corresponding pixels of HSV
image. Now we start embedding the encrypted codes of
corresponding message bit, first we check whether the Hue,
Saturation and Value lies between the range 0.1500 - 0.9500 if
the condition satisfies the code is embedded else the Value and
Saturation are left blank and a false index ‘Y’ is added to Hue
where ‘Y’ is a odd number. The code for ‘s’ is 23 since the Hue,
Saturation and Value lies in between 0.1500 – 0.9500 so the 2nd
and 3rd
significant bit of saturation layer is replaced with 23 and
an index ‘X’ is added to the Hue layer where ‘X’ can is an odd
no similarly ‘t’ and ‘e’ is embedded in third case the Saturation
range exceeds so we don’t use it and add a false index ‘Y’ to the
hue layer similarly the whole message is added to the Saturation
and Value layer. The range of hue and saturation for every
image is different and the ranges are stored in the V4 block of
image.
The messages are embedded into the six blocks S1, S2, S3,
V1, V3 and V3 in a spherical order. The stego key is stored
in the S4 block and the starting and closing index of the six
blocks are stored in the V4 bock. Fig 4 shows how finally
data is embedded.
Fig 2.3: final image after embedding
After embedding completely the image is again converted
to RGB image which is the output, stego image.
Fig 2.4: Flowchart of embedding algorithm at sender’s end
3.2. Information retrieving algorithm
First the stego image which is in RGB format is converted
into HSV image using color space transformation.
The three layers Hue, Saturation and value are extracted
from the HSV image. The saturation and value layers are
divided into 4 non overlapping blocks and the hue layer
remains as it is. Fig 2.1 shows the three layers and how the
blocks are divided.
Then stego key is fetched from S4 block using the index
stored in V4 block.
The fetched stego key is then compared with user input key
.If both key matches then using stego key the information is
fetched from S1,S2,S3,V1,V2 and V3 blocks.
Then the algorithm checks the starting and closing index of
the S1, S2, S3, V1, V2 and V3 blocks which are obtained
from V4 block.
4. International Journal of Computer Applications (0975 – 8887)
International Conference in Distributed Computing & Internet Technology (ICDCIT-2014)
11
Fig 3.1: Retrieving of messages
Fig 3.1 shows how the algorithm first checks the range of
Hue and Saturation and once the condition is satisfied we
check the 2nd
significant bit of Hue layer if the bit is odd we
extract the 2nd
and 3rd
significant bit of saturation layer
which is our encrypted code, similarly the whole encrypted
code is extracted from different blocks in a spiral manner
like shown in Fig 2.3.
The encrypted codes are converted into message using our
cryptography algorithm.
Fig 3.2: Flowchart of retrieving algorithm at receivers end.
4. The Experimental Results
The efficiency of all Steganography algorithms have to comply
with same basic requirements. The requirements are Invisibility,
Payload capacity, Robustness against statistical attacks and
independent of file format. In this algorithm we have used two
image formats BMP and PNG. The Peak Signal Noise Ratio
(PSNR), Payload capacity of different image format is calculated
and compared in two different formats finally the histograms of
cover image and stego image are compared. We have carried out
the experiment and implemented the above algorithm using
MATLAB R2012b with two different images (a) Flower image
(b) Pony image.
Fig 4: Comparison of cover and stego images
The above figure shows the comparison between the original
PNG and BMP image with the stego BMP and PNG image it
shows that the distortion by naked eyes between cover image
and stego image is almost zero. The surfaces of both image
shows no difference when viewed with naked eyes even though
the size of stego image is slightly higher than the cover image.
We then test the algorithm using the PSNR (Peak signal-to-noise
ratio). PSNR is a standard measurement used in Steganography
technique in order to test the quality of the stego images. The
higher the value of PSNR, the higher quality the stego image
will have. If the cover image is C of size M × M and the stego
image is S of size N × N, then each cover image C and stego
image S will have pixel value (x, y) from 0 to M-1 and 0 to N-1
respectively. The PSNR is then calculated as follows:
In equation (1) MAX represents the maximum possible pixel
value of the image. For example, if the pixels are represented
using 8 bits per sample, then the MAX value is 255.
If the stego image has higher PSNR value then stego image is
more secure. Table 1.1 and 1.2 shows the comparisons between
the both stego and cover image before and after embedding. The
size of image increase after embedding of message since the
increased size is negligible so both cover and stego images are
alike, with the images in Fig. 4 we get PSNR value 86.1204 and
833217 when 1KB of data is stored in the pie image in both png
and bmp format similarly we get 71.9543 and 73.4313 when 1kb
of data is stored in flower image. The PSNR value decreases
when the size of stored data increases. We get best results when
we store 25KB of data which is equivalent to 6 pages and 6500
words in both images in all formats and get a PSNR value of
60.4147 and 61.3201 in pie image in both the formats
respectively. Similarly we get PSNR values of 59.1625 and
60.1202 for the flower image.
5. International Journal of Computer Applications (0975 – 8887)
International Conference in Distributed Computing & Internet Technology (ICDCIT-2014)
12
Table 1.1- PSNR value for pie image
Table 1.2- PSNR value for flower image
Fig 6.1 and 6.2 show the color histogram plots the cover and
stego images for all three channels. One more important thing to
note from the histograms is that, our algorithm preserves the
general shapes of the histograms. This feature of our algorithm
makes it difficult to detect whether any data is hidden or not in
the transmitted image.
Fig 6.1: Histogram for the cover image (pie.bmp).
Fig 6.2: Histogram for the stego image (pie.bmp).
5. CONCLUSIONS
This paper proposes a new algorithm that provides three layered
security using RGB image that makes it secure against
Steganalysis and statistical attacks. It uses cryptography,
Steganography and HSV palettes i.e. the three security layers.
We have experimented and tested few images in various formats
with the proposed algorithm; we found that the stego image does
not have a noticeable distortion on it (as seen by the naked eyes).
We embed the data in the HSV layers which increases the
payload capacity of the image. We also get a high PSNR value
so the algorithm is efficient to hide data inside images.
6. REFERENCES
[1]Stefan katzenbeisser, Fabien a. p. petitcolas, “Information
hiding techniques for steganography and digital
watermarking”, 2000, pp.
[2] Coron, J.-S., “what is cryptography? IEEE Security and
Privacy, 2006. 4(1): p. 70-73”
[3] Akhil khare, Meenu kumarl, J Palla vi khare , “Efficient
Algorithm for Digital Image Steganography”. Journal of
information, knowledge and research in computer science
applications.
[4] T. Morkel, j.h.p. eloff and M.s. olivier, ”An Overview of
Image Steganography”,information and computer security
architecture (icsa) research group.
[5]Jarno mielikainen, "lsb matching revisited", Signal
Processing Letters, IEEE, Publication date: may 2006
Volume: 13, issue: 5, pp. 285- 287.
[6] Kanzariya nitin k. and Nimavat ashish v, “Comparison of
Various Images Steganography Techniques”, vol 2 issue 1
jan13.
[7]Gandharba swain and Saroj Kumar lenka , “A novel
Approach to RGB Channel Based Image Steganography
Technique”. International Arab journal of e-technology,
vol.2 no. 4 , june 2012.
[8] S. agaian1 and Juan p. perez2, “New Pixel Sorting Method
for Palette Based Steganography and Color Model
Selection.
[9] Mei-ching Chen, S. agaian, and C. L. philip
chen,"Generalized collage steganography on images",
IEEE, 2008.
[10]Chandramouli, r. & Memon, n. (2001). proceedings of
ICPC ’01: IEEE International conference on image
6. International Journal of Computer Applications (0975 – 8887)
International Conference in Distributed Computing & Internet Technology (ICDCIT-2014)
13
processing. thessaloniki: Institute of electrical and
electronics engineers computer society.
[11]Fridrich, j., Goljan, m., &Du, r. (2001). “Detecting lsb
steganography in color and gray-scale images.” IEEE
multimedia, 8(4), 22-28.
[12] Wen chen1, Yun q. shi1, Guorong xuan2 , “Identifying
computer graphics using hsv color model and statistical
moments of characteristic functions.”
[13] Adnan Gutub, Mahmoud Ankeer, Muhammad Abu-
Ghalioun, Abdulrahman Shaheen, and Aleem Alvi, Pixel
indicator high capacity technique for RGB image based
Steganography, WoSPA 2008 – 5th IEEE International
Workshop on Signal Processing and its Applications,
University of Sharjah, Sharjah, U.A.E. 18 – 20 March
2008.
[14] N.N. El-Emam, Hiding a large amount of data with high
security using steganography algorithm, Journal of
Computer Science 3 (2007) 223-232.
[15]Mohammed tanver parver and Adnan Abdul Aziz-gutub,
RGB intensity based variable-bits image Steganography,
IEEE Asia-Pacific services computing conference.