SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
DOI : 10.5121/ijait.2013.3301 1
COMPARISON OF SECURE AND HIGH CAPACITY
COLOR IMAGE STEGANOGRAPHY TECHNIQUES IN
RGB AND YCBCR DOMAINS
Hemalatha S1
, U Dinesh Acharya2
, Renuka A3
1,2,3
Department of Computer Science and Engineering, Manipal Institute of Technology,
Manipal University, Manipal, Karnataka, India
1
hema.shama@manipal.edu;2
dinesh.acharya@manipal.edu;
3
renuka.prabhu@manipal.edu
ABSTRACT
Steganography is one of the methods used for secret communication. Steganography attempts to hide the
existence of the information. The object used to hide the secret information is called as cover object.
Images are the most popular cover objects used for steganography. Different techniques have to be used for
color image steganography and grey scale image steganography since they are stored in different ways.
Color image are normally stored with 24 bit depth and grey scale images are stored with 8 bit depth. Color
images can hold large amount of secret information since they have three color components. Different
color spaces namely RGB (Red Green Blue), HSV (Hue, Saturation, Value), YUV, YIQ, YCbCr (Luminance,
Chrominance) etc. are used to represent color images. Color image steganography can be done in any
color space domain. In this paper color image steganography in RGB and YCbCr domain are compared.
The secret information considered is grey scale image. Since RGB is the common method of representation,
hiding secret information in this format is not secure.
KEYWORDS
Steganography, Integer Wavelet Transform (IWT), MSE, PSNR, RGB, YCbCr, Luminance, Chrominance
1. INTRODUCTION
Information security is essential in the field of secure communication. Steganography is used for
secure information exchange. Communication between two parties is always subject to
unauthorized interception. Steganography is one of the methods used to send secret information
such that there is no evidence that the opponent can intercept and try decoding the information. In
steganography some medium such as image, audio or video is used to hide secret information.
The signal used to hide secret information is called as cover object. Stego-object is the cover along
with the hidden information [1].
The most popular cover objects used for steganography are images. In image steganography color
image steganography finds more importance than grey scale image steganography because color
images have large space for information hiding. Different color spaces namely RGB (Red Green
Blue), HSV (Hue, Saturation, Value), YUV, YIQ, YCbCr (Luminance, Chrominance) etc. are
used to represent color images. Color image steganography can be done in any color space
domain. One of the best representations for steganography is YCbCr. Human eye is very
sensitive to changes in luminance but not in chrominance. So small changes in chrominance part
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
2
cannot alter the overall image quality much [2,3]. Luminance component is Y and Cb, Cr are the
blue and red chrominance components respectively. These are shown in Figure 1.
(a) (b) (c) (d)
Figure 1 (a) Lena, (b) Y component (luminance) of (a), (c) Cb component (chrominance blue) of (a), (d) Cr
component (chrominance red) of (a).
The conversion formulae are used to convert values from one color space to another color space
[3]. The conversion to YCbCr from RGB is as follows:
Y = (77/256)R + (150/256)G + (29/256)B (1.1)
Cb = −(44/256)R − (87/256)G + (131/256)B + 128 (1.2)
Cr = (131/256)R − (110/256)G − (21/256)B + 128 (1.3)
The opposite transformation is
R = Y+1.371(Cr − 128) (1.4)
G = Y− 0.698(Cr − 128) − 0.336(Cb − 128) (1.5)
B = Y+1.732(Cb − 128) (1.6)
In this paper color image steganography in RGB and YCbCr domain are compared. Image
steganography may be in spatial domain or transform domain. Spatial domain techniques embed
secret information in the pixel values directly. Here the advantage is the simplicity. But they
suffer ability to bear signal processing operations like filtering, compression, noise insertion,
cropping etc. In transform domain methods, the cover image is transformed into different domain
and then the transformed coefficients are modified to hide secret information. The stego image is
obtained by transforming back the modified coefficients into spatial domain. High ability to face
signal processing operations is the advantage of transform domain methods [1], but they are
computationally complex. However in steganography since robustness and security are the two
main characteristics, transform domain techniques are more preferable. In this paper Integer
Wavelet Transform (IWT) is used to hide secret images in the color cover image.
The stego signal is highly robust if it can withstand manipulations such as filtering, cropping,
rotation, compression etc. Security is the inability of an attacker to detect the information even if
the existence of the information is realized [4]. If the stego image is closer to the cover image,
then it is very secure. It is measured in terms of Peak Signal to Noise Ratio (PSNR).
PSNR = dB (1.7)
where L = peak value, MSE = Mean Square Error.
MSE = (1.8)
where X = original value, X’ = stego value and N = number of samples.
The larger the PSNR value the higher the security since it indicates minimum difference between
the original and stego values. So no one can detect the hidden information.
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
3
The Wavelet Transform gives time-frequency representation of the signal. IWT is an efficient
approach to lossless compression. The coefficients in this transform are represented by finite
precision numbers which allows for lossless encoding. It maps integers to integers. But in
Discrete Wavelet Transform, the output coefficients are not integers when the input consists of
integers, as in the case of images. Thus the perfect reconstruction of the original image is not
possible. Since IWT maps integers to integers the output can be completely characterized with
integers and so perfect reconstruction is possible. In case of IWT, the LL sub-band is a close copy
with smaller scale of the original image while in the case of DWT the LL sub-band is slightly
distorted. This is shown in Figure 2 [5].
Figure 2 (a) Original image Lena. (b) LL sub band in one level DWT (c) LL sub-band in one level IWT.
2. RELATED WORK
In this section some of the recent colour image steganography techniques are reviewed.
A new approach based on LSB is proposed by Masud, Karim S.M., Rahman, M.S., Hossain, M.I.
[6]. The hidden information is encrypted by a secret key and then it is stored into different
position of LSB of image. This provides very good security. Xie, Qing., Xie, Jianquan., Xiao,
Yunhua [7]., proposed a method to hide the information in all RGB planes based on HVS
(Human Visual System). The quality of the stego image is degraded.
Vector Quantization (VQ) table is used by Sachdeva S and Kumar A,[8], to hide the secret
message which enhances the capacity and also stego size. For hiding text messages Roy, S.,
Parekh, R., [9] proposed an improved steganography approach. They hide the text message within
lossless RGB images. This fails to face signal processing operations. Mandal, J.K., Sengupta, M.
proposed minimum deviation of fidelity based data embedding technique [10]. Here the
replacement positions are chosen randomly between LSB and up to fourth bit towards MSB to
modify two bits per byte. Rubab, S., Younus, M. [11], embedded text message in color image
using DWT. Blowfish encryption technique is used to encrypt the text message. This is a
complex method. Nabin Ghoshal et al., (SSCIA) [12] used DFT to hide image.
In the proposed work the actual secret images are not hidden in the cover image. Just by hiding
the keys the secret images are transmitted. YCbCr technique is implemented in our previous
works [13] and [14]. In [13], one grey scale is hidden in color image using Discrete Wavelet
Transform (DWT) and IWT. In [14], the capacity is improved by hiding two grey scale images in
one color image using IWT only. This improves the quality of the stego image. In the proposed
method, different encryption method is used to encrypt the keys so that technique becomes more
secure.
3. PROPOSED METHOD
In the proposed method, the cover is 256x256 color image. Two grey scale images of size 128
x128 are used as secret images. The following sections describe the embedding and extracting
methods for steganography in RGB and YCbCr domains.
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
4
3.1. Steganography in RGB Domain
The color cover image is considered in the normal RGB representation. The three components red
green and blue are extracted. Two grey scale images are hidden in two color components. The
experiment is conducted first by hiding in green and blue components and then by hiding in red
and green components. In the second case the quality of the stego image is slightly better than
that in the first case but the quality of the extracted secret images are slightly poor. This
comparison is done by calculating the PSNR values. When red and blue components are used for
hiding secret images the results are same as those with red and green components. So the results
are shown when the secret images are hidden in green and blue components. The following sub
sections explain the embedding and extracting processes in the RGB domain.
3.1.1. Embedding Process
• Let the cover image be C and let two secret images be S1 and S2.
• Single level IWT of secret-images S1, S2 and green and blue components of C, are obtained.
• Four sub-bands corresponding to low and high frequency coefficients are obtained. They are
termed as LL, LH, HL and HH sub bands.
• LL sub band of green component is used to hide one secret image and LL sub band of blue
component is used to hide another secret image as follows:
o The sub-images CgLL and S1LL of green component of C and S1 are divided into
non-overlapping blocks of size 2x2. i.e., BCgk =(1 ≤ k < nc) and BS1i =(1 ≤ i < ns),
where BCgk, BS1i represent kth
block in CgLL, ith
block in S1LL respectively and nc
is the total number of 2x2 blocks in CgLL and ns is the total number of 2x2 blocks in
S1LL.
o Every block BS1i, is compared with block BCgk. The pair of blocks which have the
least Root Mean Square Error is determined. The address of the best matched block
BCgk for the block BS1i is stored in a key. Let it be K1.
o Similarly, the key K2 is obtained by considering the LL sub band of blue component
of C and LL sub band of S2.
o The two keys are then encrypted and then hidden in the cover image. The high
frequency components LH, HL and HH of green component of C are used to hide the
key K1 and K2 is hidden in high frequency components of blue component of C. The
steps are as follows:
 The binary image is constructed using the middle bit planes of the higher
frequency components of the transformed image of green component of
C.
 The Key K1 is compressed.
 The bits of the compressed key K1 are hidden in the middle bit planes of
the higher frequency components of the transformed image of green
component of C. (fourth and higher bit planes are used in the
experimentation.)
 The inverse IWT of the resulting image is obtained to get the green
component of the stego image.
o Similarly K2 is hidden in the middle bit planes of the higher frequency components
of the transformed image of blue component of C.
o Then inverse IWT is applied to get the blue component of the stego image.
3.1.2. Extracting Process
• Decompose the stego image into red, green and blue components.
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
5
• Find the integer wavelet transform of green and blue components of the stego image
separately.
• The binary image is obtained using the higher frequency components of the green and blue
components of the transformed image.
• The encrypted, compressed keys K1 and K2 are present in the middle bit planes of the higher
frequency components of green and blue components of the transformed image respectively.
• Decrypt and decompress them to obtain the original keys K1 and K2.
Then secret images are obtained with the help of keys K1 and K2 as follows:
• Divide LL sub band of green component into non overlapping blocks of size 2x2.
• The blocks that are the nearest approximation to the original blocks of S1LL are obtained
using K1.
• Rearrange the blocks to obtain S1LLnew.
• Obtain the secret image S1 by considering S1LHnew, S1HLnew and S1HHnew as zero
matrices of dimension S1LLnew and then by obtaining inverse IWT of S1new.
• Similarly obtain S2 from LL sub band of blue component using K2.
3.2. Steganography in YCbCr Domain
The normal color image in RGB is transformed into YCbCr color space. The following sub
sections explain the embedding and extracting processes in the YCbCr domain.
3.2.1. Embedding Process
• Let the cover image be C and let two secret images be S1 and S2.
• The cover image C is represented in YCbCr color space.
• Single level IWT of secret-images S1, S2 and Cb, Cr component of C, are obtained.
• Four sub-bands corresponding to low and high frequency coefficients are obtained. They are
termed as LL, LH, HL and HH sub bands.
• One secret image is hidden in LL sub band of Cb and another secret image is hidden in LL sub band
of Cr. The steps are as follows:
o The sub-images CbLL and S1LL of Cb component and S1 are divided into non-
overlapping blocks of size 2x2. i.e., BCbk =(1 ≤ k < nc) and BS1i =(1 ≤ i < ns),
where BCbk, BS1i represent kth
block in CbLL, ith
block in S1LL respectively and nc
is the total number of 2x2 blocks in CbLL and ns is the total number of 2x2 blocks in
S1LL.
o Every block BS1i, is compared with block BCbk. The pair of blocks which have the
least Root Mean Square Error is determined. The address of the best matched block
BCbk for the block BS1i is stored in a key. Let it be K1.
o Similarly, the key K2 is obtained by considering the LL sub band of Cr and LL sub
band of S2.
o The two keys are then encrypted and then hidden in the cover image. The high
frequency components LH, HL and HH of Cb are used to hide the key K1 and K2 is
hidden in high frequency components of Cr. The steps are as follows:
 The binary image using the middle bit planes of the higher frequency
components of the transformed image of Cb is constructed.
 The Key K1 is compressed.
 The bits of the compressed key K1 are hidden in the middle bit planes of
the higher frequency components of the transformed image of Cb. (fourth
and higher bit planes are used in the experimentation.)
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
6
 The inverse IWT of the resulting image is obtained to get the Cb
component of the stego image.
o Similarly K2 is hidden in the middle bit planes of the higher frequency components
of the transformed image of Cr.
o The resultant image is represented in RGB color space to obtain stego image G.
3.2.2. Extracting Process
The steps to extract secret images from the Cb and Cr components of the stego image are as
follows:
• The stego image G is represented in YCbCr color space. Let it be GyGcbGcr
• IWT of Gcb and Gcr components is obtained.
• The binary image is constructed using the higher frequency components of the transformed
image separately.
• The middle bit planes of the higher frequency components of Gcb and Gcr contain the
encrypted, compressed keys K1 and K2 respectively.
• Decrypt and decompress them to obtain the original keys K1 and K2.
Then secret images are obtained with the help of keys K1 and K2 as follows:
• GcbLL is divided into non overlapping blocks of size 2x2.
• The blocks that are the nearest approximation to the original blocks of S1LL are obtained
using K1.
• Rearrange the blocks to obtain S1LLnew.
• Obtain the secret image S1 by considering S1LHnew, S1HLnew and S1HHnew as zero
matrices of dimension S1LLnew and then by obtaining inverse IWT of S1new.
• Similarly obtain S2 from GcrLL using K2.
4. EXPERIMENTAL RESULTS
The algorithm is tested in MATLAB. The wavelet tool box is used. The lifting wave cdf 2.2 is
used to find the integer wavelet transform. Various test images are used to test the algorithm.
Figure 3 shows original cover and secret images. The cover images used are “baboon” and
“peppers” (Figure 3(a) and 3(b)), each of size 256X256. The secret images considered are “earth”
and “football” (Figure 3(c) and 3(d)), each of size 128X128.
The results of steganography in RGB domain are shown in Figure 4. Figure 4(a) and 4(b) show
the stego images. Figure 4(c) and 4(d) show the extracted secret images from “baboon”. Figure
4(e) and 4(f) show the extracted secret images from “peppers”.
(a) (b) (c) (d)
Figure 3 Cover and secret images: (a) cover (baboon) (b) cover (peppers) (c) secret (earth) (d) secret
(football)
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
7
(a) (b) (c) (d)
(e) (f)
Figure 4 Stego and extracted secret images from RGB steganography: (a) stego (baboon), (b) stego
(peppers), (c)-(f) extracted secret images: (c) football from baboon (d) earth from baboon (e) football from
peppers (f) earth from peppers
The results of steganography in YCbCr domain are shown in Figure 5. Figure 5(a) and 5(b) show
the stego images. Figure 5(c) and 5(d) show the extracted secret images from “baboon”. Figure
5(e) and 5(f) show the extracted secret images from “peppers”.
(a) (b) (c) (d)
(e) (f)
Figure 5 Stego and extracted secret images from YCbCr steganography: (a) stego (baboon), (b) stego
(peppers), (c)-(f) extracted secret images: (c) football from baboon (d) earth from baboon (e) football from
peppers (f) earth from peppers
Table 1 shows the PSNR value of the stego images in the two steganographic methods. Table 2
shows the PSNR values of the extracted secret images in the two steganographic methods.
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
8
Table 1. PSNR (in dB) of the stego images
Table 2. PSNR (in dB) of the extracted secret image
5. CONCLUSIONS
In this paper, two color image steganography methods are compared along with the experimental
results. Since in color images large amount of information can be hidden color image
steganography finds importance in the information security field. The results show that the
quality of the stego images are good in RGB domain by comparing the PSNR values. But RGB
method may be detected more easily than YCbCr method since RGB is the normal standard
representation for color images. And RGB steganography method requires more execution time
than YCbCr method. The PSNR values show that the quality of extracted secret images are good
in YCbCr method. But only PSNR value is not the quality measuring metric as the visual
appearance of the resultant images reveal. Some other parameters must be used to mesure the
security or qulity of the steganography technique. This will be the factor for our future work.
REFERENCES
[1] Abbas Cheddad et.al, (2010), “Digital image steganography: Survey and analysis of current methods”,
Signal Processing 90, pp. 727–752.
[2] Shejul, A. A., Kulkarni, U.L., (2011), “A Secure Skin Tone based Steganography (SSTS) using
Wavelet Transform”, International Journal of Computer Theory and Engineering, Vol.3, No.1, pp. 16-
22.
[3] David Salomon, (2004), “Data Compression- The Complete Reference ”, 3rd edn, Springer-Verlag.
[4] Katzenbeisser, S. and Petitcolas, F.A.P., (2000), “Information Hiding Techniques for Steganography
and Digital Watermarking”, Artech House, Inc., Boston, London.
[5] Elham Ghasemi, Jamshid Shanbehzadeh and Bahram ZahirAzami, (2011), "A Steganographic
method based on Integer Wavelet Transform and Genetic Algorithm", IEEE conference, pp 42-45.
[6] Masud, Karim S.M., Rahman, M.S., Hossain, M.I., (2011), “A New Approach for LSB Based Image
Steganography using Secret Key.”, Proceedings of 14th International Conference on Computer and
Information Technology, IEEE Conference Publications, pp 286 – 291.
[7] Xie, Qing., Xie, Jianquan., Xiao, Yunhua., (2010), “A High Capacity Information Hiding Algorithm
in Color Image.”, Proceedings of 2nd International Conference on E-Business and Information
System Security, IEEE Conference Publications, pp 1-4.
[8] Sachdeva, S and Kumar, A., (2012), “Colour Image Steganography Based on Modified Quantization
Table.”, Proceedings of Second International Conference on Advanced Computing & Communication
Technologies , IEEE Conference Publications, pp 309 – 313.
COVER IMAGE
STEGANOGRAPHIC
METHOD
RGB YCbCr
peppers 47 41
baboon 48 41
SECRET IMAGE
STEGANOGRAPHIC
METHOD
RGB YCbCr
football 27 32
earth 28 33
International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013
9
[9] Roy, S., Parekh, R., (2011), “A Secure Keyless Image Steganography Approach for Lossless RGB
Images.”, Proceedings of International Conference on Communication, Computing & Security, ACM
Publications, pp 573-576.
[10] Mandal, J.K., Sengupta, M., (2011), “Steganographic Technique Based on Minimum Deviation of
Fidelity (STMDF).”, Proceedings of Second International Conference on Emerging Applications of
Information Technology, IEEE Conference Publications, pp 298 – 301.
[11] Rubab, S., Younus, M., (2012), “Improved Image Steganography Technique for Colored Images
using Wavelet Transform”, International Journal of Computer Applications, Volume 39– No.14,
February, pp 29-32.
[12] Ghoshal, N., Mandal, J.K., (2011), “A Steganographic Scheme for Colour Image Authentication
(SSCIA)”, In Proceedings of International Conference on Recent Trends in Information Technology
(ICRTIT 2011), (Madras Institute of Technology, Chennai, India ), IEEE Conference Publications,
pp 826 – 831.
[13] Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath , (March 2013), “A Secure Color Image
Steganography In Transform Domain”, International Journal on Cryptography and Information
Security (IJCIS), Vol.3, No.1, pp 17-24
[14] Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, (February 2013), “A Secure And High
Capacity Image Steganography Technique”, Signal & Image Processing : An International Journal
(SIPIJ) Vol.4, No.1, pp 83-89

More Related Content

What's hot

A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganographyrahulmonikasharma
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Low Complex-Hierarchical Coding Compression Approach for Arial Images
Low Complex-Hierarchical Coding Compression Approach for Arial ImagesLow Complex-Hierarchical Coding Compression Approach for Arial Images
Low Complex-Hierarchical Coding Compression Approach for Arial ImagesIDES Editor
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...IJRES Journal
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...eSAT Journals
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences cscpconf
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 

What's hot (20)

A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
M017427985
M017427985M017427985
M017427985
 
J017426467
J017426467J017426467
J017426467
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
High PSNR Based Image Steganography
High PSNR Based Image SteganographyHigh PSNR Based Image Steganography
High PSNR Based Image Steganography
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
N043020970100
N043020970100N043020970100
N043020970100
 
Low Complex-Hierarchical Coding Compression Approach for Arial Images
Low Complex-Hierarchical Coding Compression Approach for Arial ImagesLow Complex-Hierarchical Coding Compression Approach for Arial Images
Low Complex-Hierarchical Coding Compression Approach for Arial Images
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
G0210032039
G0210032039G0210032039
G0210032039
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
3 e.balamurugan 14-17
3 e.balamurugan 14-173 e.balamurugan 14-17
3 e.balamurugan 14-17
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 
Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...Performance evaluation of lossy image compression techniques over an awgn cha...
Performance evaluation of lossy image compression techniques over an awgn cha...
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 

Viewers also liked

Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...ijait
 
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingGray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingCSCJournals
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...IDES Editor
 
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...ijait
 
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESAN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESijait
 
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...ijait
 
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...ijait
 

Viewers also liked (7)

Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
Stabilization of Variable Bit Rate Video Streams Using Linear Lyapunov Functi...
 
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman EncodingGray Coded Grayscale Image Steganoraphy using Hufman Encoding
Gray Coded Grayscale Image Steganoraphy using Hufman Encoding
 
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
Random Valued Impulse Noise Removal in Colour Images using Adaptive Threshold...
 
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
SYSTEMATIC LITERATURE REVIEW ON RESOURCE ALLOCATION AND RESOURCE SCHEDULING I...
 
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGESAN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
AN INTEGRATED METHOD OF DATA HIDING AND COMPRESSION OF MEDICAL IMAGES
 
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
A COMPARATIVE STUDY ALGORITHM FOR NOISY IMAGE RESTORATION IN THE FIELD OF MED...
 
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
AN EMPIRICAL STUDY ON MOBILE MULTI PLATFORM DEVELOPMENT USING PHONE GAP AND H...
 

Similar to Comparing Secure Color Image Steganography Techniques in RGB and YCbCr Domains

A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...ijma
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganographyIAEME Publication
 

Similar to Comparing Secure Color Image Steganography Techniques in RGB and YCbCr Domains (20)

A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
L045056469
L045056469L045056469
L045056469
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Comparing Secure Color Image Steganography Techniques in RGB and YCbCr Domains

  • 1. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 DOI : 10.5121/ijait.2013.3301 1 COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES IN RGB AND YCBCR DOMAINS Hemalatha S1 , U Dinesh Acharya2 , Renuka A3 1,2,3 Department of Computer Science and Engineering, Manipal Institute of Technology, Manipal University, Manipal, Karnataka, India 1 hema.shama@manipal.edu;2 dinesh.acharya@manipal.edu; 3 renuka.prabhu@manipal.edu ABSTRACT Steganography is one of the methods used for secret communication. Steganography attempts to hide the existence of the information. The object used to hide the secret information is called as cover object. Images are the most popular cover objects used for steganography. Different techniques have to be used for color image steganography and grey scale image steganography since they are stored in different ways. Color image are normally stored with 24 bit depth and grey scale images are stored with 8 bit depth. Color images can hold large amount of secret information since they have three color components. Different color spaces namely RGB (Red Green Blue), HSV (Hue, Saturation, Value), YUV, YIQ, YCbCr (Luminance, Chrominance) etc. are used to represent color images. Color image steganography can be done in any color space domain. In this paper color image steganography in RGB and YCbCr domain are compared. The secret information considered is grey scale image. Since RGB is the common method of representation, hiding secret information in this format is not secure. KEYWORDS Steganography, Integer Wavelet Transform (IWT), MSE, PSNR, RGB, YCbCr, Luminance, Chrominance 1. INTRODUCTION Information security is essential in the field of secure communication. Steganography is used for secure information exchange. Communication between two parties is always subject to unauthorized interception. Steganography is one of the methods used to send secret information such that there is no evidence that the opponent can intercept and try decoding the information. In steganography some medium such as image, audio or video is used to hide secret information. The signal used to hide secret information is called as cover object. Stego-object is the cover along with the hidden information [1]. The most popular cover objects used for steganography are images. In image steganography color image steganography finds more importance than grey scale image steganography because color images have large space for information hiding. Different color spaces namely RGB (Red Green Blue), HSV (Hue, Saturation, Value), YUV, YIQ, YCbCr (Luminance, Chrominance) etc. are used to represent color images. Color image steganography can be done in any color space domain. One of the best representations for steganography is YCbCr. Human eye is very sensitive to changes in luminance but not in chrominance. So small changes in chrominance part
  • 2. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 2 cannot alter the overall image quality much [2,3]. Luminance component is Y and Cb, Cr are the blue and red chrominance components respectively. These are shown in Figure 1. (a) (b) (c) (d) Figure 1 (a) Lena, (b) Y component (luminance) of (a), (c) Cb component (chrominance blue) of (a), (d) Cr component (chrominance red) of (a). The conversion formulae are used to convert values from one color space to another color space [3]. The conversion to YCbCr from RGB is as follows: Y = (77/256)R + (150/256)G + (29/256)B (1.1) Cb = −(44/256)R − (87/256)G + (131/256)B + 128 (1.2) Cr = (131/256)R − (110/256)G − (21/256)B + 128 (1.3) The opposite transformation is R = Y+1.371(Cr − 128) (1.4) G = Y− 0.698(Cr − 128) − 0.336(Cb − 128) (1.5) B = Y+1.732(Cb − 128) (1.6) In this paper color image steganography in RGB and YCbCr domain are compared. Image steganography may be in spatial domain or transform domain. Spatial domain techniques embed secret information in the pixel values directly. Here the advantage is the simplicity. But they suffer ability to bear signal processing operations like filtering, compression, noise insertion, cropping etc. In transform domain methods, the cover image is transformed into different domain and then the transformed coefficients are modified to hide secret information. The stego image is obtained by transforming back the modified coefficients into spatial domain. High ability to face signal processing operations is the advantage of transform domain methods [1], but they are computationally complex. However in steganography since robustness and security are the two main characteristics, transform domain techniques are more preferable. In this paper Integer Wavelet Transform (IWT) is used to hide secret images in the color cover image. The stego signal is highly robust if it can withstand manipulations such as filtering, cropping, rotation, compression etc. Security is the inability of an attacker to detect the information even if the existence of the information is realized [4]. If the stego image is closer to the cover image, then it is very secure. It is measured in terms of Peak Signal to Noise Ratio (PSNR). PSNR = dB (1.7) where L = peak value, MSE = Mean Square Error. MSE = (1.8) where X = original value, X’ = stego value and N = number of samples. The larger the PSNR value the higher the security since it indicates minimum difference between the original and stego values. So no one can detect the hidden information.
  • 3. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 3 The Wavelet Transform gives time-frequency representation of the signal. IWT is an efficient approach to lossless compression. The coefficients in this transform are represented by finite precision numbers which allows for lossless encoding. It maps integers to integers. But in Discrete Wavelet Transform, the output coefficients are not integers when the input consists of integers, as in the case of images. Thus the perfect reconstruction of the original image is not possible. Since IWT maps integers to integers the output can be completely characterized with integers and so perfect reconstruction is possible. In case of IWT, the LL sub-band is a close copy with smaller scale of the original image while in the case of DWT the LL sub-band is slightly distorted. This is shown in Figure 2 [5]. Figure 2 (a) Original image Lena. (b) LL sub band in one level DWT (c) LL sub-band in one level IWT. 2. RELATED WORK In this section some of the recent colour image steganography techniques are reviewed. A new approach based on LSB is proposed by Masud, Karim S.M., Rahman, M.S., Hossain, M.I. [6]. The hidden information is encrypted by a secret key and then it is stored into different position of LSB of image. This provides very good security. Xie, Qing., Xie, Jianquan., Xiao, Yunhua [7]., proposed a method to hide the information in all RGB planes based on HVS (Human Visual System). The quality of the stego image is degraded. Vector Quantization (VQ) table is used by Sachdeva S and Kumar A,[8], to hide the secret message which enhances the capacity and also stego size. For hiding text messages Roy, S., Parekh, R., [9] proposed an improved steganography approach. They hide the text message within lossless RGB images. This fails to face signal processing operations. Mandal, J.K., Sengupta, M. proposed minimum deviation of fidelity based data embedding technique [10]. Here the replacement positions are chosen randomly between LSB and up to fourth bit towards MSB to modify two bits per byte. Rubab, S., Younus, M. [11], embedded text message in color image using DWT. Blowfish encryption technique is used to encrypt the text message. This is a complex method. Nabin Ghoshal et al., (SSCIA) [12] used DFT to hide image. In the proposed work the actual secret images are not hidden in the cover image. Just by hiding the keys the secret images are transmitted. YCbCr technique is implemented in our previous works [13] and [14]. In [13], one grey scale is hidden in color image using Discrete Wavelet Transform (DWT) and IWT. In [14], the capacity is improved by hiding two grey scale images in one color image using IWT only. This improves the quality of the stego image. In the proposed method, different encryption method is used to encrypt the keys so that technique becomes more secure. 3. PROPOSED METHOD In the proposed method, the cover is 256x256 color image. Two grey scale images of size 128 x128 are used as secret images. The following sections describe the embedding and extracting methods for steganography in RGB and YCbCr domains.
  • 4. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 4 3.1. Steganography in RGB Domain The color cover image is considered in the normal RGB representation. The three components red green and blue are extracted. Two grey scale images are hidden in two color components. The experiment is conducted first by hiding in green and blue components and then by hiding in red and green components. In the second case the quality of the stego image is slightly better than that in the first case but the quality of the extracted secret images are slightly poor. This comparison is done by calculating the PSNR values. When red and blue components are used for hiding secret images the results are same as those with red and green components. So the results are shown when the secret images are hidden in green and blue components. The following sub sections explain the embedding and extracting processes in the RGB domain. 3.1.1. Embedding Process • Let the cover image be C and let two secret images be S1 and S2. • Single level IWT of secret-images S1, S2 and green and blue components of C, are obtained. • Four sub-bands corresponding to low and high frequency coefficients are obtained. They are termed as LL, LH, HL and HH sub bands. • LL sub band of green component is used to hide one secret image and LL sub band of blue component is used to hide another secret image as follows: o The sub-images CgLL and S1LL of green component of C and S1 are divided into non-overlapping blocks of size 2x2. i.e., BCgk =(1 ≤ k < nc) and BS1i =(1 ≤ i < ns), where BCgk, BS1i represent kth block in CgLL, ith block in S1LL respectively and nc is the total number of 2x2 blocks in CgLL and ns is the total number of 2x2 blocks in S1LL. o Every block BS1i, is compared with block BCgk. The pair of blocks which have the least Root Mean Square Error is determined. The address of the best matched block BCgk for the block BS1i is stored in a key. Let it be K1. o Similarly, the key K2 is obtained by considering the LL sub band of blue component of C and LL sub band of S2. o The two keys are then encrypted and then hidden in the cover image. The high frequency components LH, HL and HH of green component of C are used to hide the key K1 and K2 is hidden in high frequency components of blue component of C. The steps are as follows:  The binary image is constructed using the middle bit planes of the higher frequency components of the transformed image of green component of C.  The Key K1 is compressed.  The bits of the compressed key K1 are hidden in the middle bit planes of the higher frequency components of the transformed image of green component of C. (fourth and higher bit planes are used in the experimentation.)  The inverse IWT of the resulting image is obtained to get the green component of the stego image. o Similarly K2 is hidden in the middle bit planes of the higher frequency components of the transformed image of blue component of C. o Then inverse IWT is applied to get the blue component of the stego image. 3.1.2. Extracting Process • Decompose the stego image into red, green and blue components.
  • 5. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 5 • Find the integer wavelet transform of green and blue components of the stego image separately. • The binary image is obtained using the higher frequency components of the green and blue components of the transformed image. • The encrypted, compressed keys K1 and K2 are present in the middle bit planes of the higher frequency components of green and blue components of the transformed image respectively. • Decrypt and decompress them to obtain the original keys K1 and K2. Then secret images are obtained with the help of keys K1 and K2 as follows: • Divide LL sub band of green component into non overlapping blocks of size 2x2. • The blocks that are the nearest approximation to the original blocks of S1LL are obtained using K1. • Rearrange the blocks to obtain S1LLnew. • Obtain the secret image S1 by considering S1LHnew, S1HLnew and S1HHnew as zero matrices of dimension S1LLnew and then by obtaining inverse IWT of S1new. • Similarly obtain S2 from LL sub band of blue component using K2. 3.2. Steganography in YCbCr Domain The normal color image in RGB is transformed into YCbCr color space. The following sub sections explain the embedding and extracting processes in the YCbCr domain. 3.2.1. Embedding Process • Let the cover image be C and let two secret images be S1 and S2. • The cover image C is represented in YCbCr color space. • Single level IWT of secret-images S1, S2 and Cb, Cr component of C, are obtained. • Four sub-bands corresponding to low and high frequency coefficients are obtained. They are termed as LL, LH, HL and HH sub bands. • One secret image is hidden in LL sub band of Cb and another secret image is hidden in LL sub band of Cr. The steps are as follows: o The sub-images CbLL and S1LL of Cb component and S1 are divided into non- overlapping blocks of size 2x2. i.e., BCbk =(1 ≤ k < nc) and BS1i =(1 ≤ i < ns), where BCbk, BS1i represent kth block in CbLL, ith block in S1LL respectively and nc is the total number of 2x2 blocks in CbLL and ns is the total number of 2x2 blocks in S1LL. o Every block BS1i, is compared with block BCbk. The pair of blocks which have the least Root Mean Square Error is determined. The address of the best matched block BCbk for the block BS1i is stored in a key. Let it be K1. o Similarly, the key K2 is obtained by considering the LL sub band of Cr and LL sub band of S2. o The two keys are then encrypted and then hidden in the cover image. The high frequency components LH, HL and HH of Cb are used to hide the key K1 and K2 is hidden in high frequency components of Cr. The steps are as follows:  The binary image using the middle bit planes of the higher frequency components of the transformed image of Cb is constructed.  The Key K1 is compressed.  The bits of the compressed key K1 are hidden in the middle bit planes of the higher frequency components of the transformed image of Cb. (fourth and higher bit planes are used in the experimentation.)
  • 6. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 6  The inverse IWT of the resulting image is obtained to get the Cb component of the stego image. o Similarly K2 is hidden in the middle bit planes of the higher frequency components of the transformed image of Cr. o The resultant image is represented in RGB color space to obtain stego image G. 3.2.2. Extracting Process The steps to extract secret images from the Cb and Cr components of the stego image are as follows: • The stego image G is represented in YCbCr color space. Let it be GyGcbGcr • IWT of Gcb and Gcr components is obtained. • The binary image is constructed using the higher frequency components of the transformed image separately. • The middle bit planes of the higher frequency components of Gcb and Gcr contain the encrypted, compressed keys K1 and K2 respectively. • Decrypt and decompress them to obtain the original keys K1 and K2. Then secret images are obtained with the help of keys K1 and K2 as follows: • GcbLL is divided into non overlapping blocks of size 2x2. • The blocks that are the nearest approximation to the original blocks of S1LL are obtained using K1. • Rearrange the blocks to obtain S1LLnew. • Obtain the secret image S1 by considering S1LHnew, S1HLnew and S1HHnew as zero matrices of dimension S1LLnew and then by obtaining inverse IWT of S1new. • Similarly obtain S2 from GcrLL using K2. 4. EXPERIMENTAL RESULTS The algorithm is tested in MATLAB. The wavelet tool box is used. The lifting wave cdf 2.2 is used to find the integer wavelet transform. Various test images are used to test the algorithm. Figure 3 shows original cover and secret images. The cover images used are “baboon” and “peppers” (Figure 3(a) and 3(b)), each of size 256X256. The secret images considered are “earth” and “football” (Figure 3(c) and 3(d)), each of size 128X128. The results of steganography in RGB domain are shown in Figure 4. Figure 4(a) and 4(b) show the stego images. Figure 4(c) and 4(d) show the extracted secret images from “baboon”. Figure 4(e) and 4(f) show the extracted secret images from “peppers”. (a) (b) (c) (d) Figure 3 Cover and secret images: (a) cover (baboon) (b) cover (peppers) (c) secret (earth) (d) secret (football)
  • 7. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 7 (a) (b) (c) (d) (e) (f) Figure 4 Stego and extracted secret images from RGB steganography: (a) stego (baboon), (b) stego (peppers), (c)-(f) extracted secret images: (c) football from baboon (d) earth from baboon (e) football from peppers (f) earth from peppers The results of steganography in YCbCr domain are shown in Figure 5. Figure 5(a) and 5(b) show the stego images. Figure 5(c) and 5(d) show the extracted secret images from “baboon”. Figure 5(e) and 5(f) show the extracted secret images from “peppers”. (a) (b) (c) (d) (e) (f) Figure 5 Stego and extracted secret images from YCbCr steganography: (a) stego (baboon), (b) stego (peppers), (c)-(f) extracted secret images: (c) football from baboon (d) earth from baboon (e) football from peppers (f) earth from peppers Table 1 shows the PSNR value of the stego images in the two steganographic methods. Table 2 shows the PSNR values of the extracted secret images in the two steganographic methods.
  • 8. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 8 Table 1. PSNR (in dB) of the stego images Table 2. PSNR (in dB) of the extracted secret image 5. CONCLUSIONS In this paper, two color image steganography methods are compared along with the experimental results. Since in color images large amount of information can be hidden color image steganography finds importance in the information security field. The results show that the quality of the stego images are good in RGB domain by comparing the PSNR values. But RGB method may be detected more easily than YCbCr method since RGB is the normal standard representation for color images. And RGB steganography method requires more execution time than YCbCr method. The PSNR values show that the quality of extracted secret images are good in YCbCr method. But only PSNR value is not the quality measuring metric as the visual appearance of the resultant images reveal. Some other parameters must be used to mesure the security or qulity of the steganography technique. This will be the factor for our future work. REFERENCES [1] Abbas Cheddad et.al, (2010), “Digital image steganography: Survey and analysis of current methods”, Signal Processing 90, pp. 727–752. [2] Shejul, A. A., Kulkarni, U.L., (2011), “A Secure Skin Tone based Steganography (SSTS) using Wavelet Transform”, International Journal of Computer Theory and Engineering, Vol.3, No.1, pp. 16- 22. [3] David Salomon, (2004), “Data Compression- The Complete Reference ”, 3rd edn, Springer-Verlag. [4] Katzenbeisser, S. and Petitcolas, F.A.P., (2000), “Information Hiding Techniques for Steganography and Digital Watermarking”, Artech House, Inc., Boston, London. [5] Elham Ghasemi, Jamshid Shanbehzadeh and Bahram ZahirAzami, (2011), "A Steganographic method based on Integer Wavelet Transform and Genetic Algorithm", IEEE conference, pp 42-45. [6] Masud, Karim S.M., Rahman, M.S., Hossain, M.I., (2011), “A New Approach for LSB Based Image Steganography using Secret Key.”, Proceedings of 14th International Conference on Computer and Information Technology, IEEE Conference Publications, pp 286 – 291. [7] Xie, Qing., Xie, Jianquan., Xiao, Yunhua., (2010), “A High Capacity Information Hiding Algorithm in Color Image.”, Proceedings of 2nd International Conference on E-Business and Information System Security, IEEE Conference Publications, pp 1-4. [8] Sachdeva, S and Kumar, A., (2012), “Colour Image Steganography Based on Modified Quantization Table.”, Proceedings of Second International Conference on Advanced Computing & Communication Technologies , IEEE Conference Publications, pp 309 – 313. COVER IMAGE STEGANOGRAPHIC METHOD RGB YCbCr peppers 47 41 baboon 48 41 SECRET IMAGE STEGANOGRAPHIC METHOD RGB YCbCr football 27 32 earth 28 33
  • 9. International Journal of Advanced Information Technology (IJAIT) Vol. 3, No. 3, June 2013 9 [9] Roy, S., Parekh, R., (2011), “A Secure Keyless Image Steganography Approach for Lossless RGB Images.”, Proceedings of International Conference on Communication, Computing & Security, ACM Publications, pp 573-576. [10] Mandal, J.K., Sengupta, M., (2011), “Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF).”, Proceedings of Second International Conference on Emerging Applications of Information Technology, IEEE Conference Publications, pp 298 – 301. [11] Rubab, S., Younus, M., (2012), “Improved Image Steganography Technique for Colored Images using Wavelet Transform”, International Journal of Computer Applications, Volume 39– No.14, February, pp 29-32. [12] Ghoshal, N., Mandal, J.K., (2011), “A Steganographic Scheme for Colour Image Authentication (SSCIA)”, In Proceedings of International Conference on Recent Trends in Information Technology (ICRTIT 2011), (Madras Institute of Technology, Chennai, India ), IEEE Conference Publications, pp 826 – 831. [13] Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath , (March 2013), “A Secure Color Image Steganography In Transform Domain”, International Journal on Cryptography and Information Security (IJCIS), Vol.3, No.1, pp 17-24 [14] Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, (February 2013), “A Secure And High Capacity Image Steganography Technique”, Signal & Image Processing : An International Journal (SIPIJ) Vol.4, No.1, pp 83-89