SlideShare a Scribd company logo
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
59 Copyright © 2018. IJEMR. All Rights Reserved.
Volume-8, Issue-4, August 2018
International Journal of Engineering and Management Research
Page Number: 59-62
DOI: doi.org/10.31033/ijemr.8.4.7
Implementation of Steganographic Model using Inverted LSB Insertion
Shubhangi D. Kamat1
, Prof. S.S. Patil2
and Prof. A.S. Mali3
1
M.E. Student, Department of Electronics Engineering, Tatyasaheb Kore Institute of Engineering & Technology, Warananagar,
Affiliated to Shivaji University, Kolhapur, Maharashtra, INDIA
2
Professor, Department of Electronics Engineering, Tatyasaheb Kore Institute of Engineering & Technology, Warananagar,
Affiliated to Shivaji University, Kolhapur, Maharashtra, INDIA
3
Assistant Professor, Department of Electronics Engineering, Tatyasaheb Kore Institute of Engineering & Technology,
Warananagar, Affiliated to Shivaji University, Kolhapur, Maharashtra, INDIA
1
Corresponding Author: mmsovani@gmail.com
ABSTRACT
The most important thing in this insecure world is
the secrecy of everything. In today’s world, any important
data costs more than money. Steganography is the technique
in which one can hide data as a secrete in selected image. In
case of spatial domain, LSB approach is most popular in
steganography, where all the LSBs of pixels of image are
replaced by the bits of secret data. But the problem is that
the secrete can be easily guessed by the hacker and the data is
obtained by extracting it from direct LSBs. To make the
system more robust and to improve the signal to noise ratio,
the conventional LSB insertion method is replaced by
inverted LSB technic. The decision to invert or not the LSB
depends on combination of the 2nd
and 3rd
LSB. As not each
and every LSB is inverted, it makes the steganalysis very
difficult.
Keywords— Steganography, Least significant bit, Peak
signal to noise ratio, Cover image, Steganalysis
I. INTRODUCTION
As the development of Internet technologies
increases, the transmission of digital media is now-a-days
convenient over the networks. But secret message
transmissions over the Internet system suffer from serious
security overhead. So, protecting of secret messages during
transmission becomes an important issue [1].
To protect your secret information from the
strangers, it is necessary to convert the information into
unrecognizable form. So various methods for information
hiding like cryptography or steganography are used. This
paper deals about one of the efficient methods to avoid
detection of secret data by attackers. The paper gives
efficient method for security using inverted LSB method
based on steganography [2].
Steganography is the term used to describe the
hiding of data in images to avoid detection by attackers. It
is an emerging area which is used for secured data
transmission over any public media. Steganography is the
art of writing hidden messages in such a way that no one,
apart from the sender and intended recipient, suspects the
existence of the message, a form of security through
obscurity.
Steganography is a data hiding technique which
conceals the existence of data in the medium.
Steganography provides secrecy of text or images to
prevent them from attackers. Image steganography embed
the message in a cover image and changes its properties.
Steganography provides secret communication so that
intended hacker or attacker unable to sense the presence of
message [3].
When we deal with steganography then mainly
three things should be taken seriously.
1) The capacity -to hide the secrete message. This should
be maximum.
2) Imperceptibility- It is the visual quality after hiding the
data
3) Robustness.
The conventional LSB insertion technic is good if
it is related only to imperceptibility but when it comes to
the capacity, it is very low as we can hide 1 bit per pixel.
Also it is not robust as once it is detected that the
image contains some hidden message, by retrieving only
LSBs one can get the secrete data easily.
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
60 Copyright © 2018. IJEMR. All Rights Reserved.
Fig. shows the model of steganography process.
1.1 Types of steganography:
1) Text Steganography: Digital files are not used very
often because text files have a very small amount of
redundant data.
2) Image Steganography: It is quite simple and secure way
to transfer the information over the internet.
3) Audio/Video Steganography: It is very complex in use.
II. EXISTING METHODOLOGY
In the LSB replacement technic, it simply stores
the Information in cover image directly by replcing a
single bit of a pixel which does not cause perceptible
difference in original image quality.
The disadvantages of LSB approach is the size of
cover image required for a particular message image that is
for a certain capacity of message, cover image required is
8 times .Thus it increases the bandwidth.
Another disadvantage is that if an attacker
suspects that some information is hidden behind the cover
image, He can easily extract information by just collecting
LSBs of stego image. For these criteria, this method is not
successful.
III. PROPOSED METHOD
To make the conventional LSB method more robust and to
increase its hiding capacity, we are here with some
changes in methodology. We will use color images as
cover to increase the hiding capacity and we will change
some LSBs depending upon some situations.
The proposed work is shown in block diagram 1. Proposed
work is based on image processing with following steps.
Secret message –
The generation of secret message is always the
first step in the workflow sequence. This is the data of user
which is to be protected from the intruder. This message
can be any data of prime importance that should be
secured.
The cover image –
for hiding the secret message is obtained .This
image can be of any form which should be converted to
eight bit pixel format and the LSB of which is replaced
with single bit of secrete message.
Inversion of LSB –
The secret bit embedded in cover image is not
always kept as it is because if the hacker suspects about
LSB insertion, he can retrieve the secret message easily.
So one important change in this proposed method is that
the LSB will be inverted depending on the combination of
second and third LSBs.
With 2nd
and 3rd
LSB, there are total four
combinations- 00, 01, 10, 11. Selecting one of these four,
we will either invert the LSB or not. As all LSBs are not
inverted, hence it may create confusion for the attacker
about correctness of the retrieved message if he succeeds
in hacking the message.
Retrieving message –
At the receiver side the intended recipient has the
knowledge about the inverted bits. Hence upon receiving
the data he can make separation of cover image and secrete
message and with knowledge of inverted bits, he gains the
original secret message without loss.
IV. RESULTS AND ANALYSIS
We use 3 cover images. Each image size is 800 * 600.
1) Taj
2) Sunset
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
61 Copyright © 2018. IJEMR. All Rights Reserved.
3) Roses
and 3 secrete messages.
1. It is better to see something once, than to hear
about it a thousand times. (Taj)
2. There is nothing more musical than a
sunset.(sunset)
3. Be a rose which gives fragrance even to those
who crush it. (Rose)
If we use different cover images and different
message as a secrete data then let’s check results.
The combination of 2nd
and 3rd
LSB can be
00,01,10,11. Out of these combination, we will choose the
one for which the less number of bits are required to
change. This will help us to fool the intruder with the help
of Imperceptibility.
For any of the combination of secrete message
and the cover Image, we can find out the change in signal
to noise ratio before and after inversion of LSB.
For example, if we consider the secrete message
about Taj and the cover image is also Taj , then the signal
to noise ratio changed can be shown with the help of a bar
chart.
V. CONCLUSION
1. The proposed least significant bit inversion scheme
enhances the stego-image quality. This is because not all the
LSBs are changed, but depending upon the pair of 2nd
and 3rd
LSB, some of the LSBs are changed .This helps in making
confusion for the hacker.
2. Even though the intruder could determine if the mes sage
bits are embedded using some staganalysis methods, he
would have difficulty to recover it because some of the LSBs
have been inverted; it will misguide the staganalysis process
and make the message recovery difficult. The bit inversion
method makes the steganography better by improving its
security and image quality.
3. It improves the signal to noise ratio. The signal to noise
ratio SNR will be increased because the modification in
cover image is less and so the stego image will not diverge
much from original cover image as compared to classical
LSB method.
REFERENCES
[1] Amitava Nag, Saswati Ghosh, Sushanta Biswas,
Debasree Sarkar, & Partha Pratim Sarkar. (2012). An
image steganography technique using x-box mapping.
IEEE- International Conference on Advances in
Engineering, Science and Management (ICAESM), 709-
713.
[2] Nadeem Akhtar, Shahbaaz Khan, & Pragati Johri.
(2014). An improved inverted LSB image steganography.
International Conference on Issues and Challenges in
Intelligent Computing Techniques (ICICT), 749-755.
[3] Mandar D. Khatavkar & Prof. A.S. Mali. (2016). A
Image security with image steganography using DCT
coefficient and encryption. International Journal of
Innovations in Engineering Research and Technology,
3(9), 1-8.
[4] Hemang A. Prajapati & Dr. Nehal G. Chitaliya. (2015).
Secured and robust dual image steganography:A survey.
69.05
69.1
69.15
1 2 3 4
signaltonoiseratio
before and after inversion of LSBs
Improved SNR
www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962
62 Copyright © 2018. IJEMR. All Rights Reserved.
International Journal of Innovative Research in Computer
and Communication Engineering, 3(1), 30-37.
[5] Zhenhao Zhu, Tao Zhang, & Baoji Wan. (2013). A
special detector for the edge adaptive image steganography
based on LSB matching revisited. 10th
IEEE International
Conference on Control and Automation (ICCA) Hangzhou,
China, 1363-1366.
[6] Jatinder Kaur & Ira Gabba. (2013 August).
Steganography using RSA algorithm. International
Journal of Innovative Technology and Exploring
Engineering, 3(3), 75-79.
[7] Miss Sonali V.Nemade & Prof. A.S. Mali. (2016). A
review of automatic detection of micro aneurysm and
diabetic retinopathy grading in fundus retinal images.
International Journal of Research Publication in
Engineering and Technology, 2(4), 1-3.
[8] Weiqi Luo, Fangjun Huang, & Jiwu Huang. (2010
June). Edge adaptive image steganography based on LSB
matching revisited. IEEE Transactions on Information
Forensics and Security, 5(2), 201-214.
[9] Swati Tiwari & R.P.Mahajan. (2012). A secure image
based steganographic model using RSA algorithm and
LSB insertion for increased robustness. International
Journal of Electronics Communication and Computer
Engineering, 3(1), 7-85.
[10] Manjunath N & S.G. Hiremath. (2015). Image and
text steganography based on RSA and chaos cryptography
algorithm with hash LSB technique for more security.
International Journal of Electrical, Electronics and
Computer Systems, 3(5), 5-9.
[11] Dr. M.Umamaheswari, Prof. S.Sivasubramanian, &
S.Pandiarajan. (2010 August). Analysis of different
steganographic algorithms for secured data hiding.
International Journal of Computer Science and Network
Security, 10(8), 154-160.
[12] R.Chandramouli & Nasir Memon. (2001). Analysis of
LSB based image steganography techniques. IEEE
International Conference on Image Processing (ICIP) -
Thessaloniki, Greece, 1019-1022.

More Related Content

What's hot

Bi34381384
Bi34381384Bi34381384
Bi34381384
IJERA Editor
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
Editor IJCATR
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
acijjournal
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
IRJET Journal
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
ijsptm
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
Tutorial Learners
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
CSCJournals
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
Shivam Porwal
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
IRJET Journal
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
eSAT Publishing House
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
sipij
 
C010511420
C010511420C010511420
C010511420
IOSR Journals
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
IJECEIAES
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
AnsabArshad
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
Aparna Nk
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
Praneeta Dehare
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
ijtsrd
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
eSAT Journals
 

What's hot (20)

Bi34381384
Bi34381384Bi34381384
Bi34381384
 
Enhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSBEnhancement of Payload Capacity for Image Steganography based on LSB
Enhancement of Payload Capacity for Image Steganography based on LSB
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSISIMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
IMAGE STEGANOGRAPHY JAVA PROJECT SYNOPSIS
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
C010511420
C010511420C010511420
C010511420
 
Text in Image Hiding using Developed LSB and Random Method
Text in Image Hiding using Developed LSB and  Random Method Text in Image Hiding using Developed LSB and  Random Method
Text in Image Hiding using Developed LSB and Random Method
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Image Steganography V2 i11 0143
Image Steganography V2 i11 0143Image Steganography V2 i11 0143
Image Steganography V2 i11 0143
 
Android Based Image Steganography
Android Based Image SteganographyAndroid Based Image Steganography
Android Based Image Steganography
 
Transmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptographyTransmission of cryptic text using rotational visual cryptography
Transmission of cryptic text using rotational visual cryptography
 

Similar to Implementation of Steganographic Model using Inverted LSB Insertion

Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
IJERA Editor
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
IRJET Journal
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
VijayMaheshwari12
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
ijtsrd
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
IRJET Journal
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
Jeff Brooks
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET Journal
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
ijtsrd
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
editor1knowledgecuddle
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
Nathan Mathis
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
Editor IJCATR
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
ijtsrd
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
IRJET Journal
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Dr. Amarjeet Singh
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
INFOGAIN PUBLICATION
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
ijsrd.com
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET Journal
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
IRJET Journal
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
VijayMaheshwari12
 

Similar to Implementation of Steganographic Model using Inverted LSB Insertion (20)

Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
LSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an ImageLSB Based Stegnography to Enhance the Security of an Image
LSB Based Stegnography to Enhance the Security of an Image
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
A- Review On Image Steganography
A- Review On Image SteganographyA- Review On Image Steganography
A- Review On Image Steganography
 
Image Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH TechniqueImage Steganography Using HBC and RDH Technique
Image Steganography Using HBC and RDH Technique
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Image Steganography Project Report
Image Steganography Project ReportImage Steganography Project Report
Image Steganography Project Report
 

More from Dr. Amarjeet Singh

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Dr. Amarjeet Singh
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
Dr. Amarjeet Singh
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Dr. Amarjeet Singh
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Dr. Amarjeet Singh
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Dr. Amarjeet Singh
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
Dr. Amarjeet Singh
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
Dr. Amarjeet Singh
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
Dr. Amarjeet Singh
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
Dr. Amarjeet Singh
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Dr. Amarjeet Singh
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Dr. Amarjeet Singh
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Dr. Amarjeet Singh
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Dr. Amarjeet Singh
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Dr. Amarjeet Singh
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
Dr. Amarjeet Singh
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
Dr. Amarjeet Singh
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Dr. Amarjeet Singh
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Dr. Amarjeet Singh
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
Dr. Amarjeet Singh
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
Dr. Amarjeet Singh
 

More from Dr. Amarjeet Singh (20)

Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
Total Ionization Cross Sections due to Electron Impact of Ammonia from Thresh...
 
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., BhiladA Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
A Case Study on Small Town Big Player – Enjay IT Solutions Ltd., Bhilad
 
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
Effect of Biopesticide from the Stems of Gossypium Arboreum on Pink Bollworm ...
 
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
Artificial Intelligence Techniques in E-Commerce: The Possibility of Exploiti...
 
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
Factors Influencing Ownership Pattern and its Impact on Corporate Performance...
 
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
An Analytical Study on Ratios Influencing Profitability of Selected Indian Au...
 
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
A Study on Factors Influencing the Financial Performance Analysis Selected Pr...
 
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
An Empirical Analysis of Financial Performance of Selected Oil Exploration an...
 
A Study on Derivative Market in India
A Study on Derivative Market in IndiaA Study on Derivative Market in India
A Study on Derivative Market in India
 
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
Theoretical Estimation of CO2 Compression and Transport Costs for an hypothet...
 
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological FluidAnalytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
Analytical Mechanics of Magnetic Particles Suspended in Magnetorheological Fluid
 
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-ManureTechno-Economic Aspects of Solid Food Wastes into Bio-Manure
Techno-Economic Aspects of Solid Food Wastes into Bio-Manure
 
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
Crypto-Currencies: Can Investors Rely on them as Investment Avenue?
 
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
Awareness of Disaster Risk Reduction (DRR) among Student of the Catanduanes S...
 
Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857Role of Indians in the Battle of 1857
Role of Indians in the Battle of 1857
 
Haryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of ViewHaryana's Honour Killings: A Social and Legal Point of View
Haryana's Honour Killings: A Social and Legal Point of View
 
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
Optimization of Digital-Based MSME E-Commerce: Challenges and Opportunities i...
 
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
Modal Space Controller for Hydraulically Driven Six Degree of Freedom Paralle...
 
Capacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel IndustryCapacity Expansion Banes in Indian Steel Industry
Capacity Expansion Banes in Indian Steel Industry
 
Metamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain EcosystemMetamorphosing Indian Blockchain Ecosystem
Metamorphosing Indian Blockchain Ecosystem
 

Recently uploaded

Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
drwaing
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
aqil azizi
 

Recently uploaded (20)

Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
digital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdfdigital fundamental by Thomas L.floydl.pdf
digital fundamental by Thomas L.floydl.pdf
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdfTutorial for 16S rRNA Gene Analysis with QIIME2.pdf
Tutorial for 16S rRNA Gene Analysis with QIIME2.pdf
 

Implementation of Steganographic Model using Inverted LSB Insertion

  • 1. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 59 Copyright © 2018. IJEMR. All Rights Reserved. Volume-8, Issue-4, August 2018 International Journal of Engineering and Management Research Page Number: 59-62 DOI: doi.org/10.31033/ijemr.8.4.7 Implementation of Steganographic Model using Inverted LSB Insertion Shubhangi D. Kamat1 , Prof. S.S. Patil2 and Prof. A.S. Mali3 1 M.E. Student, Department of Electronics Engineering, Tatyasaheb Kore Institute of Engineering & Technology, Warananagar, Affiliated to Shivaji University, Kolhapur, Maharashtra, INDIA 2 Professor, Department of Electronics Engineering, Tatyasaheb Kore Institute of Engineering & Technology, Warananagar, Affiliated to Shivaji University, Kolhapur, Maharashtra, INDIA 3 Assistant Professor, Department of Electronics Engineering, Tatyasaheb Kore Institute of Engineering & Technology, Warananagar, Affiliated to Shivaji University, Kolhapur, Maharashtra, INDIA 1 Corresponding Author: mmsovani@gmail.com ABSTRACT The most important thing in this insecure world is the secrecy of everything. In today’s world, any important data costs more than money. Steganography is the technique in which one can hide data as a secrete in selected image. In case of spatial domain, LSB approach is most popular in steganography, where all the LSBs of pixels of image are replaced by the bits of secret data. But the problem is that the secrete can be easily guessed by the hacker and the data is obtained by extracting it from direct LSBs. To make the system more robust and to improve the signal to noise ratio, the conventional LSB insertion method is replaced by inverted LSB technic. The decision to invert or not the LSB depends on combination of the 2nd and 3rd LSB. As not each and every LSB is inverted, it makes the steganalysis very difficult. Keywords— Steganography, Least significant bit, Peak signal to noise ratio, Cover image, Steganalysis I. INTRODUCTION As the development of Internet technologies increases, the transmission of digital media is now-a-days convenient over the networks. But secret message transmissions over the Internet system suffer from serious security overhead. So, protecting of secret messages during transmission becomes an important issue [1]. To protect your secret information from the strangers, it is necessary to convert the information into unrecognizable form. So various methods for information hiding like cryptography or steganography are used. This paper deals about one of the efficient methods to avoid detection of secret data by attackers. The paper gives efficient method for security using inverted LSB method based on steganography [2]. Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. It is an emerging area which is used for secured data transmission over any public media. Steganography is the art of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Steganography is a data hiding technique which conceals the existence of data in the medium. Steganography provides secrecy of text or images to prevent them from attackers. Image steganography embed the message in a cover image and changes its properties. Steganography provides secret communication so that intended hacker or attacker unable to sense the presence of message [3]. When we deal with steganography then mainly three things should be taken seriously. 1) The capacity -to hide the secrete message. This should be maximum. 2) Imperceptibility- It is the visual quality after hiding the data 3) Robustness. The conventional LSB insertion technic is good if it is related only to imperceptibility but when it comes to the capacity, it is very low as we can hide 1 bit per pixel. Also it is not robust as once it is detected that the image contains some hidden message, by retrieving only LSBs one can get the secrete data easily.
  • 2. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 60 Copyright © 2018. IJEMR. All Rights Reserved. Fig. shows the model of steganography process. 1.1 Types of steganography: 1) Text Steganography: Digital files are not used very often because text files have a very small amount of redundant data. 2) Image Steganography: It is quite simple and secure way to transfer the information over the internet. 3) Audio/Video Steganography: It is very complex in use. II. EXISTING METHODOLOGY In the LSB replacement technic, it simply stores the Information in cover image directly by replcing a single bit of a pixel which does not cause perceptible difference in original image quality. The disadvantages of LSB approach is the size of cover image required for a particular message image that is for a certain capacity of message, cover image required is 8 times .Thus it increases the bandwidth. Another disadvantage is that if an attacker suspects that some information is hidden behind the cover image, He can easily extract information by just collecting LSBs of stego image. For these criteria, this method is not successful. III. PROPOSED METHOD To make the conventional LSB method more robust and to increase its hiding capacity, we are here with some changes in methodology. We will use color images as cover to increase the hiding capacity and we will change some LSBs depending upon some situations. The proposed work is shown in block diagram 1. Proposed work is based on image processing with following steps. Secret message – The generation of secret message is always the first step in the workflow sequence. This is the data of user which is to be protected from the intruder. This message can be any data of prime importance that should be secured. The cover image – for hiding the secret message is obtained .This image can be of any form which should be converted to eight bit pixel format and the LSB of which is replaced with single bit of secrete message. Inversion of LSB – The secret bit embedded in cover image is not always kept as it is because if the hacker suspects about LSB insertion, he can retrieve the secret message easily. So one important change in this proposed method is that the LSB will be inverted depending on the combination of second and third LSBs. With 2nd and 3rd LSB, there are total four combinations- 00, 01, 10, 11. Selecting one of these four, we will either invert the LSB or not. As all LSBs are not inverted, hence it may create confusion for the attacker about correctness of the retrieved message if he succeeds in hacking the message. Retrieving message – At the receiver side the intended recipient has the knowledge about the inverted bits. Hence upon receiving the data he can make separation of cover image and secrete message and with knowledge of inverted bits, he gains the original secret message without loss. IV. RESULTS AND ANALYSIS We use 3 cover images. Each image size is 800 * 600. 1) Taj 2) Sunset
  • 3. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 61 Copyright © 2018. IJEMR. All Rights Reserved. 3) Roses and 3 secrete messages. 1. It is better to see something once, than to hear about it a thousand times. (Taj) 2. There is nothing more musical than a sunset.(sunset) 3. Be a rose which gives fragrance even to those who crush it. (Rose) If we use different cover images and different message as a secrete data then let’s check results. The combination of 2nd and 3rd LSB can be 00,01,10,11. Out of these combination, we will choose the one for which the less number of bits are required to change. This will help us to fool the intruder with the help of Imperceptibility. For any of the combination of secrete message and the cover Image, we can find out the change in signal to noise ratio before and after inversion of LSB. For example, if we consider the secrete message about Taj and the cover image is also Taj , then the signal to noise ratio changed can be shown with the help of a bar chart. V. CONCLUSION 1. The proposed least significant bit inversion scheme enhances the stego-image quality. This is because not all the LSBs are changed, but depending upon the pair of 2nd and 3rd LSB, some of the LSBs are changed .This helps in making confusion for the hacker. 2. Even though the intruder could determine if the mes sage bits are embedded using some staganalysis methods, he would have difficulty to recover it because some of the LSBs have been inverted; it will misguide the staganalysis process and make the message recovery difficult. The bit inversion method makes the steganography better by improving its security and image quality. 3. It improves the signal to noise ratio. The signal to noise ratio SNR will be increased because the modification in cover image is less and so the stego image will not diverge much from original cover image as compared to classical LSB method. REFERENCES [1] Amitava Nag, Saswati Ghosh, Sushanta Biswas, Debasree Sarkar, & Partha Pratim Sarkar. (2012). An image steganography technique using x-box mapping. IEEE- International Conference on Advances in Engineering, Science and Management (ICAESM), 709- 713. [2] Nadeem Akhtar, Shahbaaz Khan, & Pragati Johri. (2014). An improved inverted LSB image steganography. International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 749-755. [3] Mandar D. Khatavkar & Prof. A.S. Mali. (2016). A Image security with image steganography using DCT coefficient and encryption. International Journal of Innovations in Engineering Research and Technology, 3(9), 1-8. [4] Hemang A. Prajapati & Dr. Nehal G. Chitaliya. (2015). Secured and robust dual image steganography:A survey. 69.05 69.1 69.15 1 2 3 4 signaltonoiseratio before and after inversion of LSBs Improved SNR
  • 4. www.ijemr.net ISSN (ONLINE): 2250-0758, ISSN (PRINT): 2394-6962 62 Copyright © 2018. IJEMR. All Rights Reserved. International Journal of Innovative Research in Computer and Communication Engineering, 3(1), 30-37. [5] Zhenhao Zhu, Tao Zhang, & Baoji Wan. (2013). A special detector for the edge adaptive image steganography based on LSB matching revisited. 10th IEEE International Conference on Control and Automation (ICCA) Hangzhou, China, 1363-1366. [6] Jatinder Kaur & Ira Gabba. (2013 August). Steganography using RSA algorithm. International Journal of Innovative Technology and Exploring Engineering, 3(3), 75-79. [7] Miss Sonali V.Nemade & Prof. A.S. Mali. (2016). A review of automatic detection of micro aneurysm and diabetic retinopathy grading in fundus retinal images. International Journal of Research Publication in Engineering and Technology, 2(4), 1-3. [8] Weiqi Luo, Fangjun Huang, & Jiwu Huang. (2010 June). Edge adaptive image steganography based on LSB matching revisited. IEEE Transactions on Information Forensics and Security, 5(2), 201-214. [9] Swati Tiwari & R.P.Mahajan. (2012). A secure image based steganographic model using RSA algorithm and LSB insertion for increased robustness. International Journal of Electronics Communication and Computer Engineering, 3(1), 7-85. [10] Manjunath N & S.G. Hiremath. (2015). Image and text steganography based on RSA and chaos cryptography algorithm with hash LSB technique for more security. International Journal of Electrical, Electronics and Computer Systems, 3(5), 5-9. [11] Dr. M.Umamaheswari, Prof. S.Sivasubramanian, & S.Pandiarajan. (2010 August). Analysis of different steganographic algorithms for secured data hiding. International Journal of Computer Science and Network Security, 10(8), 154-160. [12] R.Chandramouli & Nasir Memon. (2001). Analysis of LSB based image steganography techniques. IEEE International Conference on Image Processing (ICIP) - Thessaloniki, Greece, 1019-1022.