SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 3 (Sep. - Oct. 2013), PP 37-41
www.iosrjournals.org
www.iosrjournals.org 37 | Page
New and Unconventional Techniques in Pictorial Steganography
and Steganalysis
Vikas Kothari1
, Dinesh Goyal2
Software Engineering Department / Suresh Gyan Vihar University, India
Computer Science Engineering Department/ Suresh Gyan Vihar University, India
Abstract: Steganography involves transferring data through a given channel in such a way that the communication
channel itself is hidden from all involved parties. It is a form of security through obscurity; this technique protects both
messages and stations involved in communication. In the most modern form of digital steganography, electronic
communication may include complex steganographic lines of code inside transport layer which accomplishes the
aforementioned task of protecting data and anonymity of participating stations. Steganography is much confused with the
term cryptography former is fundamentally different in the sense that the message is sent secretly without attracting any
attention of third party intruders by protecting anonymity of involved channels, nodes and stations.
Keywords: Steganography, Security and Protection, Cryptography, Data Hiding, Data Encryption
I. INTRODUCTION
Steganography is the art of invisible communication. It refers to hiding the existence of the
communication channel itself. The general idea of hiding messages in common digital contents, interests a wider class
of applications that go beyond steganography. The techniques involved in such applications are collectively referred to as
information hiding [1]. By using information hiding techniques, it is possible to fuse the digital content within the image
signal regardless of the file formatandthestatusoftheimage (digitalor analog). In this thesis we will refer to cover work or
equivalently to cover image, or simply cover to indicate the images that do not yet contain a secret message, while we will
refer to stego Work, or stego images, or stego object to indicate an image withanembeddedsecretmessage.Moreover, wewill
refertothesecretmessageasstego-messageorhiddenmessage.
Depending on the meaningandgoal ofthe embedded metadata, severalinformationhidingfieldscan bedefined, even
thoughinliteraturetheterm'information hiding' is often usedasa synonym for steganography.
From an Information Theoryperspective, we can introduce steganographybyadopting a slightlydifferent pointof view[2]. In
[3] Shannon was the first that con- sidered secrecysystems from the viewpoint of information theory. Shannon identifiedthree
typesofsecretcommunicationswhichhedescribedas
1. 'concealment systems, including such methods as concealed ink, hiding a payload in an irrelevant text, or in a fake
coveringcryptogram, orothermethodsinwhichtheexistenceofthemessageishiddenfromtheintruder’,
2. Privacy system
3. Cryptographic system
Today steganography is also seen as a way of ensuring freedom of speech in military dictatorship countries or
connected to homeland security. Steganography has also been supposed to be used by terrorists to design terroristic attacks.
Example about the terrorism are the technical jihad manual [5] that is part of a terrorist manual and the color of the Osama Bin
Laden's beard in its clips: military investigators think that secret messages are associated each color of the beard to coordinate
terrorist cells.
Another topical target of steganography is computer warfare. New worms and spywares stole a lot of information
about users and then they have to find a way to carry out this data by preventing any suspicion of transmission existence by
antivirus, firewallordatastreamanalysis. During the last few years image steganography research has raised an increasingly
interest. A variety of techniques have been proposed especially for a given image file format like gif, jpeg or images
represented in the pixel domain. In fact, the main idea behind steganographyundetectabilityis: less embedding changes to the
cover Workmeansalessdetectablestegoobject.Eventhoughthisstatementisnotcompletelytrue(asitshownin[8]), itrepresents
a good startingpointtodevelopandtoimprove initial steganographic techniques proposed in the literature.
II. RELATED WORK
Yu-Chen Shu, Wen-Liang Hwang presented Conventional secret message passing methods embed a
message in the cover-text, so the receiver must use stego-text to extract the message content. In contrast, this
paper proposes a new paradigm in which the receiver does not necessarily require stego-text to retrieve the
message content. Under the proposed approach, the sender can produce keys without modifying the cover-
image, and the intended recipient can use the keys and an image that resembles like the cover-image to recover
the message.
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
www.iosrjournals.org 38 | Page
The feature has the potential to generate many new secret message passing applications that would probably be
impossible under the current widely used paradigm. The performance criteria of the new paradigm are
presented. We propose a subspace approach to implement the paradigm, demonstrate that the criteria can be
satisfied, and consider some interesting.
Supriya Rai and Ruchi Dubey presented Steganography is one of the most powerful tools for
information hiding. In this paper, we have modified least significant bit (LSB) substitution method for data
hiding.
Conventional LSB technique uses the least significant bit of consecutive pixels for embedding the
message which draws suspicion to transmission of a hidden message. If the suspicion is raised, then the goal of
steganography is defeated. Still LSB technique is the most widely used as it is simple. In our implementation
pixels to be substituted with information are selected randomly which makes it superior to the conventional
approach. The robustness of the algorithm is further increased by using keyless steganography. This paper
proposes a novel technique to hide information in a 24 bpp RGB image using modified LSB substitution
method.
Amitava Nag , Saswati Ghosh presented Image steganography is a method of concealing information
into a cover image to hide it. Least Significant-Bit (LSB) based approach is most popular steganographic
techniques in spatial domain due to its simplicity and hiding capacity. This paper presents a novel technique for
Image steganography based on LSB using X-box mapping where we have used several Xboxes having unique
data. The embedding part is done by this Steganography algorithm where we use four unique X-boxes with
sixteen different values (represented by 4- bits) and each value is mapped to the four LSBs of the cover image.
This mapping provides sufficient security to the payload because without knowing the mapping rules no one can
extract the secret data (payload).
S.Premkumar, A.E.Narayanan presented Core banking is a set of services provided by a group of networked
bank branches. Bank customers may access their funds and perform other simple transactions from any of the
member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable
hacking of the databases on the internet, it is always quite difficult to trust the information on the internet. To
solve this problem of authentication, we are proposing an algorithm based on image processing, improved
steganography and visual cryptography. This paper proposes a technique of encode the password of a customer
by improved Steganography, most of the steganographic techniques use either three or four adjacent pixels
around a target pixel whereas the proposed technique is able to utilize at most all eight adjacent neighbours so
that imperceptibility value grows bigger and then dividing it into shares. Total number of shares to be created is
depending on the scheme chosen by the bank. When two shares are created, one is stored in the Bank database
and the other is kept by the customer. The customer has to present the share during all of his transactions. This
share is stacked with the first share to get the original image. Then decoding method is used to take the hidden
password on acceptance or rejection of the output and authenticate the customer.
Zawawi, M.N., Mahmod, R., Udzir, N., Ahmad, F. and, Desa, J.M presented The word Steganography
originated from a greek language which directly translated as covered writing. The idea of covered writing in
steganography here is a practice of hiding or covering the real information with a disguise of a day to day
widely accepted object. Traditionally in ancient times steganography is practiced by means such as, covering a
roll of scriptures inside a fruit or food item, inserting symbols on body tattoos, hidden objects in paintings and
even in clothing such as shoes. The main idea of steganography is to hide information within the physical aspect
of any everyday object where the hidden information existence is less likely to be there. In the digital age, these
objects are replaced by digital files. Since all media are available in this form, steganography techniques usually
exploit it by hiding on the bit stream, headers and even on its compression scheme. The use of this method,
however, is not without its enemy; on the other axis of steganography, there exists steganalysis which aims to
detect steganography behavior and perhaps extract the information hidden within.
III. METHODOLOGY
The contribution of this thesis is threefold. As a first contribution we introduce a comparative methodology
for the comparison of different steganalyzers. The second contribution of the thesis regards steganography, since we
introduce a new embedding domain and a corresponding method, called MPSteg-color, which outperforms, in terms of
undetectability, classical embedding methods. Next, we brieflydescribe each contribution.
Comparative methodology in steganography
As a second contribution we discuss a variety of issues associated with comparison of different
steganalyzers and highlight some of these issues with a case study comparing four steganalysis algorithms designed to detect
embedding. In particular, we discuss issues related to the creation of the training and testing sets. We emphasize that for
steganalysis, it is very unlikely that the assumptions used to cre- ate the training set will match conditions used during
deployment. Consequently, it isimperative that testingalsoinvestigateshowperformance degradesas thetest set deviates from
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
www.iosrjournals.org 39 | Page
the training data. The subsequent empirical evaluation of four algorithms on four different test sets revealed that algorithm
performance is highly variable, and strongly dependent on the training and test imagery. Experimental results clearly
demonstrate that the performance is strongly image-dependent, and that further work is needed to establish more
comprehensive databases. It is alsocommon to assume that the embedding rate is known during testing and training, but this is
unlikelytobe the casein practice. Once again, significantperformance degradation is observed. Experimentalresultsalsosuggest
that the common practice of training at a low embedding rate in order to deal with a wide range of embedding rates
during testingisnot aseffective as training witha mixture ofembeddingrates.
MPSteg-color
The third contribution regards steganography for color images. Specifically, we propose a new steganographic
method that tries to use the fail-safe of steganalyzers to improve the undetectability of the stego-message. In fact,
although steganalyzers do not know the hidden message, they rely on a statistical analysis to understand whether a given
signal contains concealed data or not. However this analysis disrespect the semantic content of the cover signal.
We argue that, from a steganographic point ofviewitispreferabletoembedthesecretmessageathigher semanticlevelsof
theimage, e.g. bymodifyingstructural elements ofthe cover imagelike lines, edges or flatareas.
By the above consideration, we propose a new steganographic technique, called MPSteg-color, that hides
thestego-messageintosomeselectedcoefficientsobtainedthrough a high redundant basis decomposition ofthe color image. The
decomposition is efficiently obtained by using a Matching Pursuit (MP) algorithm. In this way the hidden message is
embeddedatahighersemanticlevelandhenceitismoredifficultfora steganalyzer todetectit.
IV. INDENTATIONS AND EQUATIONS
The steganalysis problemisa binaryclassification problem is or isn'tthetest instance (image) a stegoimage? As such,
there arefour possible outcomes. Theseare:
1.Truepositives,i.e.testinstancesthat are correctlylabeledasstegoWorks;
2.Truenegatives,i.e.testinstancesthatarecorrectlylabeledasnon-stegoWorks;
3. False negatives, i.e. test instances that are incorrectlylabeled as non-stegoWorks;
4. Falsepositives,i.e.testinstancesthat areincorrectlylabeledasstegoWorks.
If P and N denote the real number of positive and negative instances, and T P and F P denote the predicted number of true
positives and false positives, respectively, thenthetruepositiverate,tpisdefinedas
tp = TPP ,
andthefalse positiverate, fpas:
fp = FN . P
Common performance metrics which can be derived from these include precision,recall,accuracyandF-measure:
Precision = TP/TP+FP
Recall = TP/P,
Accuracy = TP+TN
F-measure = 2/(1/precision)+(1/recall)
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
www.iosrjournals.org 40 | Page
V. FIGURES AND TABLES
In order to avoid that quantization errors prevent the correct decoding of the hiddenmessage,letusobservethatthe
stego-messageswillbeembeddedintheMPdomain bymodifyingthecoefficientsckinequation(7.3),however,afterembedding,
themodified imagemust be brought backintothe pixel domain. Ifwe want toavoid the introduction of quantization errors it is
necessarythat the reconstructed image belongstotheImageclass.
The Selection Rule
Targeted steganalyzers
The first targeted steganalyzer we used is built on the simple blocking artifacts detector (BD) described in [64]. This
technique was originallydeveloped for detect- ing JPEG block artifacts, however, we adapted it todetect theartifactsintroduced
by MPSteg-color and use them as a feature todetect the presence of a stego-message. The algorithm is very simple: we split the
image into blocks whose size should be matchedtothatusedbytheMPalgorithm. Regardless ofthe blockpartition strategythe
steganalyzer assumes that blocks arelocatedona gridalignedwith the top-left .
For each block the numbers Z =A+ DBCandZ=E+HFGarecomputed.
Z =A+ DBC
Z =E+ HFG
where A, B, C, D, E , F , G and H are taken as shown in Figure 11.1 in the case of 44 blocks, the extension to larger
blocks being trivial. Next the normalized histograms vectors h (n) and h (n) are computed respectively for Z and Z
and the followingfeatureis calculated:
255 fBD = h(n)h(n).
n=0
The above procedure is repeated for the three color bands producing a three-dimensional feature vector that is given as input to the
FLD classifier. The second steganalyzer we developed relies on the knowledge ofthe histogram of MP coefficients. For this to be
possible, we assumethat the steganalyzer knows theMPdictionarybutitdoesnotknowthereference bandthatisusedtocalculate
thedecompositionpath(hencearandombandisusedasareferencebythesteganalyzer).
Due tothe embedding asymmetryapplied to coefficients having value equal to1- thatareeither leftunchangedor incremented by
one-aflatstepappearsintheleftmost part ofthehistogram, whilethiseffect does notappear inthe cover image.
Byconsideringthis effect, we propose touse thefollowingfeature:
fMP HA = h(2)h(1)+h(3)
where h is the histogram function. In the sequel we will refer to this technique as MPHA.
VI. Result & Conclusion
Sincesimilarresultswere observedfor variousembeddingrates, we onlyreport classification results for =0.5.
Given figure shows the improvements in classification resulting from elimination of border effects. The original
algorithm of Zhang et al. is compared with a system based on feature1 ofTable 4.1 (ALE 1), andfeatures 1and 2(ALE
1-2). The error bars on each plot indicate the minimumandmaximum values observed during the 20cross-validation runs. First
of all, we note the unexpectedly poor performances of all three algorithms, i.e. the ROC curves are very close to the
diagonal. This is due tothewidevarietyofimagespresentinofcompositedatabase.
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
www.iosrjournals.org 41 | Page
Despite the poor performance of all three algorithms, the two algorithms based on new ALE features (ALE 1 and ALE 1-2)
exhibit a slight improvement in clas- sification performances. The system using the first two ALE features (ALE 1-2)
achievesthehighest performancesbasedonareaundertheROCcurve(AUC), with ascoreof0.59.
Analysis oftheimpact ofALE featuresselection on classificationresults.
REFERENCES
[1] M. Kharrazi, H. Sencar, and N. Memon, "Image Steganography: Concepts and Practice," Lecture Note Series, Institute for Mathematical Sciences,
NationalUniversity ofSingapore,2004.
[2] I.Cox,T.Kalker,G. Pakura,andM.Scheel,"Informationtransmissionandsteganography,"LectureNotesinComputerScience,vol.3710,p.15,2005.
[3] C.Shannon,"CommunicationTheoryofSecrecySystems,"BellSystemtechnicalJournal,vol.28,pp.656-715,1954.
[4] G.J.Simmons,"Theprisoners'problemandthe subliminal channel,"inAdvances in Cryptology:ProceedingsofCRYPTO'83.PlenumPubCorp,1984,pp.
51-67.
[5] R. Givner-Forbes, "Steganography: Information Technology in the Service of Jihad," The international Centre for Political Violence and Terrorism
Research, March2007.[Online]. Available: www.pvtr.org
[6] R.Anderson,"Stretchingthelimitsofsteganography,"LectureNotesinComputerScience,vol.1174,pp.39-48,1996.
[7] Wikipedia TheFreeEncyclopedia.[Online].Available: http://en.wikipedia.org/wiki/Printer_steganography
[8] G. Cancelli and M. Barni, "MPSteg-color: A new steganographic technique for color images," Information Hiding: 9th International
Workshop, Ih 2007, Saint Malo, France,June11-13,vol.4567,pp.1-15,2007.
[9] A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," in Information Hiding: 4th International Workshop,
IH 2001, Pittsburgh, PA, USA, April25-27, 2001: Proceedings. Springer,2001,p.289.
[10] M.Goljan,J.Fridrich,andT.Holotyak,"Newblind steganalysisanditsimplications," ProceedingsofSPIE,vol.6072,pp.1-13,2006.
[11] J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on wet paper," IEEE Transactions on Signal Processing,vol. 53,no. 10 Part2, pp. 3923-3935,
2005.
[12] J. Fridrich, M.Goljan,and D.Hogea, "Attackingthe outguess,"in Proc.ofthe ACM WorkshoponMultimediaandSecurity,2002.
[13] P.Sallee,"Model-basedmethods for steganographyand steganalysis,"International JournalofImageandGraphics,vol.5,no.1,pp.167-189,2005.
[14] J.Fridrich,T. Pevn`andJ.Kodovsk` "Statisticallyundetectablejpeg steganography: y, y, dead ends challenges, and opportunities," in Proceedings
ofthe9thworkshoponMul-timedia &security. ACM New York,NY, USA, 2007, pp. 3-14.

Contenu connexe

Tendances

Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Editor IJCATR
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...IJNSA Journal
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUEIJNSA Journal
 
Text hiding in text using invisible character
Text hiding in text using invisible character Text hiding in text using invisible character
Text hiding in text using invisible character IJECEIAES
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Securityijtsrd
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...IJNSA Journal
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyIJECEIAES
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 

Tendances (15)

Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...Steganography using Interpolation and LSB with Cryptography on Video Images -...
Steganography using Interpolation and LSB with Cryptography on Video Images -...
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
PVD BASED STEGNO.
PVD BASED STEGNO.PVD BASED STEGNO.
PVD BASED STEGNO.
 
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
STEGANALYSIS ALGORITHMS FOR DETECTING THE HIDDEN INFORMATION IN IMAGE, AUDIO ...
 
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUESTEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
STEGANALYSIS ALGORITHM FOR PNG IMAGES BASED ON FUZZY LOGIC TECHNIQUE
 
Text hiding in text using invisible character
Text hiding in text using invisible character Text hiding in text using invisible character
Text hiding in text using invisible character
 
Review Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image SecurityReview Paper on LSB Based Stegnography to Enhance Image Security
Review Paper on LSB Based Stegnography to Enhance Image Security
 
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...
 
Review of Role of Digital Video in Information Security
Review of Role of Digital Video in Information SecurityReview of Role of Digital Video in Information Security
Review of Role of Digital Video in Information Security
 
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
A NOVEL APPROACH OF IMAGE STEGANOGRAPHY FOR SECRET COMMUNICATION USING SPACIN...
 
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding SteganographyHungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
Hungarian-Puzzled Text with Dynamic Quadratic Embedding Steganography
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 

En vedette

Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...IOSR Journals
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356IOSR Journals
 
Thorny Issues of Stakeholder Identification and Prioritization in Requirement...
Thorny Issues of Stakeholder Identification and Prioritization in Requirement...Thorny Issues of Stakeholder Identification and Prioritization in Requirement...
Thorny Issues of Stakeholder Identification and Prioritization in Requirement...IOSR Journals
 
Synthesis and Application of Direct Dyes Derived From Terephthalic and Isopht...
Synthesis and Application of Direct Dyes Derived From Terephthalic and Isopht...Synthesis and Application of Direct Dyes Derived From Terephthalic and Isopht...
Synthesis and Application of Direct Dyes Derived From Terephthalic and Isopht...IOSR Journals
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...IOSR Journals
 
Analysis of failure of Brakes due to leakages of cylinder through CFD
Analysis of failure of Brakes due to leakages of cylinder through CFDAnalysis of failure of Brakes due to leakages of cylinder through CFD
Analysis of failure of Brakes due to leakages of cylinder through CFDIOSR Journals
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...IOSR Journals
 
A study to Design and comparison of Full Adder using Various Techniques
A study to Design and comparison of Full Adder using Various TechniquesA study to Design and comparison of Full Adder using Various Techniques
A study to Design and comparison of Full Adder using Various TechniquesIOSR Journals
 
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...IOSR Journals
 
Crash Analysis of Front under Run Protection Device using Finite Element Anal...
Crash Analysis of Front under Run Protection Device using Finite Element Anal...Crash Analysis of Front under Run Protection Device using Finite Element Anal...
Crash Analysis of Front under Run Protection Device using Finite Element Anal...IOSR Journals
 
Sequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap ShotSequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap ShotIOSR Journals
 
A Simple and an Innovative Gas Chromatography Method to Quantify Isopentane i...
A Simple and an Innovative Gas Chromatography Method to Quantify Isopentane i...A Simple and an Innovative Gas Chromatography Method to Quantify Isopentane i...
A Simple and an Innovative Gas Chromatography Method to Quantify Isopentane i...IOSR Journals
 
Automatic parking and platooning for electric vehicles redistribution in a ca...
Automatic parking and platooning for electric vehicles redistribution in a ca...Automatic parking and platooning for electric vehicles redistribution in a ca...
Automatic parking and platooning for electric vehicles redistribution in a ca...IOSR Journals
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
Implementation of PCI Target Controller Interfacing with Asynchronous SRAM
Implementation of PCI Target Controller Interfacing with Asynchronous SRAMImplementation of PCI Target Controller Interfacing with Asynchronous SRAM
Implementation of PCI Target Controller Interfacing with Asynchronous SRAMIOSR Journals
 
A Novel approach for Graphical User Interface development and real time Objec...
A Novel approach for Graphical User Interface development and real time Objec...A Novel approach for Graphical User Interface development and real time Objec...
A Novel approach for Graphical User Interface development and real time Objec...IOSR Journals
 

En vedette (20)

Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
Numerical Simulation and Design Optimization of Intake and Spiral Case for Lo...
 
J010525864
J010525864J010525864
J010525864
 
A0460109
A0460109A0460109
A0460109
 
H01064759
H01064759H01064759
H01064759
 
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
Survey on Restful Web Services Using Open Authorization (Oauth)I01545356
 
Thorny Issues of Stakeholder Identification and Prioritization in Requirement...
Thorny Issues of Stakeholder Identification and Prioritization in Requirement...Thorny Issues of Stakeholder Identification and Prioritization in Requirement...
Thorny Issues of Stakeholder Identification and Prioritization in Requirement...
 
Synthesis and Application of Direct Dyes Derived From Terephthalic and Isopht...
Synthesis and Application of Direct Dyes Derived From Terephthalic and Isopht...Synthesis and Application of Direct Dyes Derived From Terephthalic and Isopht...
Synthesis and Application of Direct Dyes Derived From Terephthalic and Isopht...
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
 
Analysis of failure of Brakes due to leakages of cylinder through CFD
Analysis of failure of Brakes due to leakages of cylinder through CFDAnalysis of failure of Brakes due to leakages of cylinder through CFD
Analysis of failure of Brakes due to leakages of cylinder through CFD
 
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
Cryptography On Android Message Application Using Look  Up Table And Dynamic ...Cryptography On Android Message Application Using Look  Up Table And Dynamic ...
Cryptography On Android Message Application Using Look Up Table And Dynamic ...
 
K0536569
K0536569K0536569
K0536569
 
A study to Design and comparison of Full Adder using Various Techniques
A study to Design and comparison of Full Adder using Various TechniquesA study to Design and comparison of Full Adder using Various Techniques
A study to Design and comparison of Full Adder using Various Techniques
 
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
Surfactant-assisted Hydrothermal Synthesis of Ceria-Zirconia Nanostructured M...
 
Crash Analysis of Front under Run Protection Device using Finite Element Anal...
Crash Analysis of Front under Run Protection Device using Finite Element Anal...Crash Analysis of Front under Run Protection Device using Finite Element Anal...
Crash Analysis of Front under Run Protection Device using Finite Element Anal...
 
Sequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap ShotSequential Pattern Mining Methods: A Snap Shot
Sequential Pattern Mining Methods: A Snap Shot
 
A Simple and an Innovative Gas Chromatography Method to Quantify Isopentane i...
A Simple and an Innovative Gas Chromatography Method to Quantify Isopentane i...A Simple and an Innovative Gas Chromatography Method to Quantify Isopentane i...
A Simple and an Innovative Gas Chromatography Method to Quantify Isopentane i...
 
Automatic parking and platooning for electric vehicles redistribution in a ca...
Automatic parking and platooning for electric vehicles redistribution in a ca...Automatic parking and platooning for electric vehicles redistribution in a ca...
Automatic parking and platooning for electric vehicles redistribution in a ca...
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
Implementation of PCI Target Controller Interfacing with Asynchronous SRAM
Implementation of PCI Target Controller Interfacing with Asynchronous SRAMImplementation of PCI Target Controller Interfacing with Asynchronous SRAM
Implementation of PCI Target Controller Interfacing with Asynchronous SRAM
 
A Novel approach for Graphical User Interface development and real time Objec...
A Novel approach for Graphical User Interface development and real time Objec...A Novel approach for Graphical User Interface development and real time Objec...
A Novel approach for Graphical User Interface development and real time Objec...
 

Similaire à New and Unconventional Techniques in Pictorial Steganography and Steganalysis

Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMijcisjournal
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueJeff Brooks
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...IJRES Journal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Methodijtsrd
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringEditor IJCATR
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Editor IJCATR
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Imageinventionjournals
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyAlexander Decker
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Methodijtsrd
 

Similaire à New and Unconventional Techniques in Pictorial Steganography and Steganalysis (20)

Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHMA SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM
 
G017444651
G017444651G017444651
G017444651
 
H017255560
H017255560H017255560
H017255560
 
A Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography TechniqueA Survey Paper On Different Steganography Technique
A Survey Paper On Different Steganography Technique
 
O017429398
O017429398O017429398
O017429398
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...A Steganography LSB technique for hiding Image within Image Using blowfish En...
A Steganography LSB technique for hiding Image within Image Using blowfish En...
 
T0 numtq0nju=
T0 numtq0nju=T0 numtq0nju=
T0 numtq0nju=
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Text Embedded System using LSB Method
Text Embedded System using LSB MethodText Embedded System using LSB Method
Text Embedded System using LSB Method
 
Feature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised ClusteringFeature Selection Algorithm for Supervised and Semisupervised Clustering
Feature Selection Algorithm for Supervised and Semisupervised Clustering
 
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...Steganography using Interpolation and LSB with Cryptography on Video Images-A...
Steganography using Interpolation and LSB with Cryptography on Video Images-A...
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within ImageA Robust Technique to Encrypt and Decrypt Confidential Data within Image
A Robust Technique to Encrypt and Decrypt Confidential Data within Image
 
Data security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptographyData security using stegnography and quantum cryptography
Data security using stegnography and quantum cryptography
 
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB MethodSecure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
Secure Data Hiding System by using AES Algorithm and Indicator Based LSB Method
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadhamedmustafa094
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilVinayVitekari
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...drmkjayanthikannan
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxchumtiyababu
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 

Dernier (20)

Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Verification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptxVerification of thevenin's theorem for BEEE Lab (1).pptx
Verification of thevenin's theorem for BEEE Lab (1).pptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

New and Unconventional Techniques in Pictorial Steganography and Steganalysis

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 3 (Sep. - Oct. 2013), PP 37-41 www.iosrjournals.org www.iosrjournals.org 37 | Page New and Unconventional Techniques in Pictorial Steganography and Steganalysis Vikas Kothari1 , Dinesh Goyal2 Software Engineering Department / Suresh Gyan Vihar University, India Computer Science Engineering Department/ Suresh Gyan Vihar University, India Abstract: Steganography involves transferring data through a given channel in such a way that the communication channel itself is hidden from all involved parties. It is a form of security through obscurity; this technique protects both messages and stations involved in communication. In the most modern form of digital steganography, electronic communication may include complex steganographic lines of code inside transport layer which accomplishes the aforementioned task of protecting data and anonymity of participating stations. Steganography is much confused with the term cryptography former is fundamentally different in the sense that the message is sent secretly without attracting any attention of third party intruders by protecting anonymity of involved channels, nodes and stations. Keywords: Steganography, Security and Protection, Cryptography, Data Hiding, Data Encryption I. INTRODUCTION Steganography is the art of invisible communication. It refers to hiding the existence of the communication channel itself. The general idea of hiding messages in common digital contents, interests a wider class of applications that go beyond steganography. The techniques involved in such applications are collectively referred to as information hiding [1]. By using information hiding techniques, it is possible to fuse the digital content within the image signal regardless of the file formatandthestatusoftheimage (digitalor analog). In this thesis we will refer to cover work or equivalently to cover image, or simply cover to indicate the images that do not yet contain a secret message, while we will refer to stego Work, or stego images, or stego object to indicate an image withanembeddedsecretmessage.Moreover, wewill refertothesecretmessageasstego-messageorhiddenmessage. Depending on the meaningandgoal ofthe embedded metadata, severalinformationhidingfieldscan bedefined, even thoughinliteraturetheterm'information hiding' is often usedasa synonym for steganography. From an Information Theoryperspective, we can introduce steganographybyadopting a slightlydifferent pointof view[2]. In [3] Shannon was the first that con- sidered secrecysystems from the viewpoint of information theory. Shannon identifiedthree typesofsecretcommunicationswhichhedescribedas 1. 'concealment systems, including such methods as concealed ink, hiding a payload in an irrelevant text, or in a fake coveringcryptogram, orothermethodsinwhichtheexistenceofthemessageishiddenfromtheintruder’, 2. Privacy system 3. Cryptographic system Today steganography is also seen as a way of ensuring freedom of speech in military dictatorship countries or connected to homeland security. Steganography has also been supposed to be used by terrorists to design terroristic attacks. Example about the terrorism are the technical jihad manual [5] that is part of a terrorist manual and the color of the Osama Bin Laden's beard in its clips: military investigators think that secret messages are associated each color of the beard to coordinate terrorist cells. Another topical target of steganography is computer warfare. New worms and spywares stole a lot of information about users and then they have to find a way to carry out this data by preventing any suspicion of transmission existence by antivirus, firewallordatastreamanalysis. During the last few years image steganography research has raised an increasingly interest. A variety of techniques have been proposed especially for a given image file format like gif, jpeg or images represented in the pixel domain. In fact, the main idea behind steganographyundetectabilityis: less embedding changes to the cover Workmeansalessdetectablestegoobject.Eventhoughthisstatementisnotcompletelytrue(asitshownin[8]), itrepresents a good startingpointtodevelopandtoimprove initial steganographic techniques proposed in the literature. II. RELATED WORK Yu-Chen Shu, Wen-Liang Hwang presented Conventional secret message passing methods embed a message in the cover-text, so the receiver must use stego-text to extract the message content. In contrast, this paper proposes a new paradigm in which the receiver does not necessarily require stego-text to retrieve the message content. Under the proposed approach, the sender can produce keys without modifying the cover- image, and the intended recipient can use the keys and an image that resembles like the cover-image to recover the message.
  • 2. New and Unconventional Techniques in Pictorial Steganography and Steganalysis www.iosrjournals.org 38 | Page The feature has the potential to generate many new secret message passing applications that would probably be impossible under the current widely used paradigm. The performance criteria of the new paradigm are presented. We propose a subspace approach to implement the paradigm, demonstrate that the criteria can be satisfied, and consider some interesting. Supriya Rai and Ruchi Dubey presented Steganography is one of the most powerful tools for information hiding. In this paper, we have modified least significant bit (LSB) substitution method for data hiding. Conventional LSB technique uses the least significant bit of consecutive pixels for embedding the message which draws suspicion to transmission of a hidden message. If the suspicion is raised, then the goal of steganography is defeated. Still LSB technique is the most widely used as it is simple. In our implementation pixels to be substituted with information are selected randomly which makes it superior to the conventional approach. The robustness of the algorithm is further increased by using keyless steganography. This paper proposes a novel technique to hide information in a 24 bpp RGB image using modified LSB substitution method. Amitava Nag , Saswati Ghosh presented Image steganography is a method of concealing information into a cover image to hide it. Least Significant-Bit (LSB) based approach is most popular steganographic techniques in spatial domain due to its simplicity and hiding capacity. This paper presents a novel technique for Image steganography based on LSB using X-box mapping where we have used several Xboxes having unique data. The embedding part is done by this Steganography algorithm where we use four unique X-boxes with sixteen different values (represented by 4- bits) and each value is mapped to the four LSBs of the cover image. This mapping provides sufficient security to the payload because without knowing the mapping rules no one can extract the secret data (payload). S.Premkumar, A.E.Narayanan presented Core banking is a set of services provided by a group of networked bank branches. Bank customers may access their funds and perform other simple transactions from any of the member branch offices. The major issue in core banking is the authenticity of the customer. Due to unavoidable hacking of the databases on the internet, it is always quite difficult to trust the information on the internet. To solve this problem of authentication, we are proposing an algorithm based on image processing, improved steganography and visual cryptography. This paper proposes a technique of encode the password of a customer by improved Steganography, most of the steganographic techniques use either three or four adjacent pixels around a target pixel whereas the proposed technique is able to utilize at most all eight adjacent neighbours so that imperceptibility value grows bigger and then dividing it into shares. Total number of shares to be created is depending on the scheme chosen by the bank. When two shares are created, one is stored in the Bank database and the other is kept by the customer. The customer has to present the share during all of his transactions. This share is stacked with the first share to get the original image. Then decoding method is used to take the hidden password on acceptance or rejection of the output and authenticate the customer. Zawawi, M.N., Mahmod, R., Udzir, N., Ahmad, F. and, Desa, J.M presented The word Steganography originated from a greek language which directly translated as covered writing. The idea of covered writing in steganography here is a practice of hiding or covering the real information with a disguise of a day to day widely accepted object. Traditionally in ancient times steganography is practiced by means such as, covering a roll of scriptures inside a fruit or food item, inserting symbols on body tattoos, hidden objects in paintings and even in clothing such as shoes. The main idea of steganography is to hide information within the physical aspect of any everyday object where the hidden information existence is less likely to be there. In the digital age, these objects are replaced by digital files. Since all media are available in this form, steganography techniques usually exploit it by hiding on the bit stream, headers and even on its compression scheme. The use of this method, however, is not without its enemy; on the other axis of steganography, there exists steganalysis which aims to detect steganography behavior and perhaps extract the information hidden within. III. METHODOLOGY The contribution of this thesis is threefold. As a first contribution we introduce a comparative methodology for the comparison of different steganalyzers. The second contribution of the thesis regards steganography, since we introduce a new embedding domain and a corresponding method, called MPSteg-color, which outperforms, in terms of undetectability, classical embedding methods. Next, we brieflydescribe each contribution. Comparative methodology in steganography As a second contribution we discuss a variety of issues associated with comparison of different steganalyzers and highlight some of these issues with a case study comparing four steganalysis algorithms designed to detect embedding. In particular, we discuss issues related to the creation of the training and testing sets. We emphasize that for steganalysis, it is very unlikely that the assumptions used to cre- ate the training set will match conditions used during deployment. Consequently, it isimperative that testingalsoinvestigateshowperformance degradesas thetest set deviates from
  • 3. New and Unconventional Techniques in Pictorial Steganography and Steganalysis www.iosrjournals.org 39 | Page the training data. The subsequent empirical evaluation of four algorithms on four different test sets revealed that algorithm performance is highly variable, and strongly dependent on the training and test imagery. Experimental results clearly demonstrate that the performance is strongly image-dependent, and that further work is needed to establish more comprehensive databases. It is alsocommon to assume that the embedding rate is known during testing and training, but this is unlikelytobe the casein practice. Once again, significantperformance degradation is observed. Experimentalresultsalsosuggest that the common practice of training at a low embedding rate in order to deal with a wide range of embedding rates during testingisnot aseffective as training witha mixture ofembeddingrates. MPSteg-color The third contribution regards steganography for color images. Specifically, we propose a new steganographic method that tries to use the fail-safe of steganalyzers to improve the undetectability of the stego-message. In fact, although steganalyzers do not know the hidden message, they rely on a statistical analysis to understand whether a given signal contains concealed data or not. However this analysis disrespect the semantic content of the cover signal. We argue that, from a steganographic point ofviewitispreferabletoembedthesecretmessageathigher semanticlevelsof theimage, e.g. bymodifyingstructural elements ofthe cover imagelike lines, edges or flatareas. By the above consideration, we propose a new steganographic technique, called MPSteg-color, that hides thestego-messageintosomeselectedcoefficientsobtainedthrough a high redundant basis decomposition ofthe color image. The decomposition is efficiently obtained by using a Matching Pursuit (MP) algorithm. In this way the hidden message is embeddedatahighersemanticlevelandhenceitismoredifficultfora steganalyzer todetectit. IV. INDENTATIONS AND EQUATIONS The steganalysis problemisa binaryclassification problem is or isn'tthetest instance (image) a stegoimage? As such, there arefour possible outcomes. Theseare: 1.Truepositives,i.e.testinstancesthat are correctlylabeledasstegoWorks; 2.Truenegatives,i.e.testinstancesthatarecorrectlylabeledasnon-stegoWorks; 3. False negatives, i.e. test instances that are incorrectlylabeled as non-stegoWorks; 4. Falsepositives,i.e.testinstancesthat areincorrectlylabeledasstegoWorks. If P and N denote the real number of positive and negative instances, and T P and F P denote the predicted number of true positives and false positives, respectively, thenthetruepositiverate,tpisdefinedas tp = TPP , andthefalse positiverate, fpas: fp = FN . P Common performance metrics which can be derived from these include precision,recall,accuracyandF-measure: Precision = TP/TP+FP Recall = TP/P, Accuracy = TP+TN F-measure = 2/(1/precision)+(1/recall)
  • 4. New and Unconventional Techniques in Pictorial Steganography and Steganalysis www.iosrjournals.org 40 | Page V. FIGURES AND TABLES In order to avoid that quantization errors prevent the correct decoding of the hiddenmessage,letusobservethatthe stego-messageswillbeembeddedintheMPdomain bymodifyingthecoefficientsckinequation(7.3),however,afterembedding, themodified imagemust be brought backintothe pixel domain. Ifwe want toavoid the introduction of quantization errors it is necessarythat the reconstructed image belongstotheImageclass. The Selection Rule Targeted steganalyzers The first targeted steganalyzer we used is built on the simple blocking artifacts detector (BD) described in [64]. This technique was originallydeveloped for detect- ing JPEG block artifacts, however, we adapted it todetect theartifactsintroduced by MPSteg-color and use them as a feature todetect the presence of a stego-message. The algorithm is very simple: we split the image into blocks whose size should be matchedtothatusedbytheMPalgorithm. Regardless ofthe blockpartition strategythe steganalyzer assumes that blocks arelocatedona gridalignedwith the top-left . For each block the numbers Z =A+ DBCandZ=E+HFGarecomputed. Z =A+ DBC Z =E+ HFG where A, B, C, D, E , F , G and H are taken as shown in Figure 11.1 in the case of 44 blocks, the extension to larger blocks being trivial. Next the normalized histograms vectors h (n) and h (n) are computed respectively for Z and Z and the followingfeatureis calculated: 255 fBD = h(n)h(n). n=0 The above procedure is repeated for the three color bands producing a three-dimensional feature vector that is given as input to the FLD classifier. The second steganalyzer we developed relies on the knowledge ofthe histogram of MP coefficients. For this to be possible, we assumethat the steganalyzer knows theMPdictionarybutitdoesnotknowthereference bandthatisusedtocalculate thedecompositionpath(hencearandombandisusedasareferencebythesteganalyzer). Due tothe embedding asymmetryapplied to coefficients having value equal to1- thatareeither leftunchangedor incremented by one-aflatstepappearsintheleftmost part ofthehistogram, whilethiseffect does notappear inthe cover image. Byconsideringthis effect, we propose touse thefollowingfeature: fMP HA = h(2)h(1)+h(3) where h is the histogram function. In the sequel we will refer to this technique as MPHA. VI. Result & Conclusion Sincesimilarresultswere observedfor variousembeddingrates, we onlyreport classification results for =0.5. Given figure shows the improvements in classification resulting from elimination of border effects. The original algorithm of Zhang et al. is compared with a system based on feature1 ofTable 4.1 (ALE 1), andfeatures 1and 2(ALE 1-2). The error bars on each plot indicate the minimumandmaximum values observed during the 20cross-validation runs. First of all, we note the unexpectedly poor performances of all three algorithms, i.e. the ROC curves are very close to the diagonal. This is due tothewidevarietyofimagespresentinofcompositedatabase.
  • 5. New and Unconventional Techniques in Pictorial Steganography and Steganalysis www.iosrjournals.org 41 | Page Despite the poor performance of all three algorithms, the two algorithms based on new ALE features (ALE 1 and ALE 1-2) exhibit a slight improvement in clas- sification performances. The system using the first two ALE features (ALE 1-2) achievesthehighest performancesbasedonareaundertheROCcurve(AUC), with ascoreof0.59. Analysis oftheimpact ofALE featuresselection on classificationresults. REFERENCES [1] M. Kharrazi, H. Sencar, and N. Memon, "Image Steganography: Concepts and Practice," Lecture Note Series, Institute for Mathematical Sciences, NationalUniversity ofSingapore,2004. [2] I.Cox,T.Kalker,G. Pakura,andM.Scheel,"Informationtransmissionandsteganography,"LectureNotesinComputerScience,vol.3710,p.15,2005. [3] C.Shannon,"CommunicationTheoryofSecrecySystems,"BellSystemtechnicalJournal,vol.28,pp.656-715,1954. [4] G.J.Simmons,"Theprisoners'problemandthe subliminal channel,"inAdvances in Cryptology:ProceedingsofCRYPTO'83.PlenumPubCorp,1984,pp. 51-67. [5] R. Givner-Forbes, "Steganography: Information Technology in the Service of Jihad," The international Centre for Political Violence and Terrorism Research, March2007.[Online]. Available: www.pvtr.org [6] R.Anderson,"Stretchingthelimitsofsteganography,"LectureNotesinComputerScience,vol.1174,pp.39-48,1996. [7] Wikipedia TheFreeEncyclopedia.[Online].Available: http://en.wikipedia.org/wiki/Printer_steganography [8] G. Cancelli and M. Barni, "MPSteg-color: A new steganographic technique for color images," Information Hiding: 9th International Workshop, Ih 2007, Saint Malo, France,June11-13,vol.4567,pp.1-15,2007. [9] A. Westfeld, "F5-a steganographic algorithm: High capacity despite better steganalysis," in Information Hiding: 4th International Workshop, IH 2001, Pittsburgh, PA, USA, April25-27, 2001: Proceedings. Springer,2001,p.289. [10] M.Goljan,J.Fridrich,andT.Holotyak,"Newblind steganalysisanditsimplications," ProceedingsofSPIE,vol.6072,pp.1-13,2006. [11] J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, "Writing on wet paper," IEEE Transactions on Signal Processing,vol. 53,no. 10 Part2, pp. 3923-3935, 2005. [12] J. Fridrich, M.Goljan,and D.Hogea, "Attackingthe outguess,"in Proc.ofthe ACM WorkshoponMultimediaandSecurity,2002. [13] P.Sallee,"Model-basedmethods for steganographyand steganalysis,"International JournalofImageandGraphics,vol.5,no.1,pp.167-189,2005. [14] J.Fridrich,T. Pevn`andJ.Kodovsk` "Statisticallyundetectablejpeg steganography: y, y, dead ends challenges, and opportunities," in Proceedings ofthe9thworkshoponMul-timedia &security. ACM New York,NY, USA, 2007, pp. 3-14.