SlideShare une entreprise Scribd logo
1  sur  6
Télécharger pour lire hors ligne
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
   INTERNATIONAL JOURNAL OF ELECTRONICS AND
   0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 4, Issue 1, January- February (2013), pp. 230-235
                                                                             IJECET
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2012): 3.5930 (Calculated by GISI)                  ©IAEME
www.jifactor.com




            CONCEALOGRAM: DIGITAL IMAGE IN IMAGE USING LSB
                        INSERTION METHOD


                                    Reena M Patel1, D J Shah2
        1
            EC department, LDRP Institute of Technology & Research, Near ITI, Sector 15,
                                     Gandhinagar, Gujarat, India,
               2
                Principal, L C institute of technology, Bhandu 384124, Gujarat, India,


   ABSTRACT

           In this paper, the authors propose a new algorithm for an image hiding
   steganographic method or concealing digital image in a cover image is introduced, and
   implemented. The proposed algorithm uses binary codes and pixels inside an image. For
   proposed paper author used spatial domain approach. The algorithm tested to see the
   viability of the proposed algorithm. Here using different algorithm, same sizes of data are
   stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for
   each of the images tested. Various parameters like robustness against attack, data hiding
   capacity and quality of stego image are also considered. Hence this new steganography
   algorithm is very efficient to hide the digital image inside the image.

   Keywords: cover image, image processing, LSB insertion, Steganography, stegoimage

   1. INTRODUCTION

          Steganography is the science of hiding information. The goal of steganography is
   to hide the information and be undetectable to human eyes. Steganography focuses on the
   means of communication and the development of a covert channel. Steganography
   focuses entirely on keeping the adversary completely unaware of the communication.
   There are several information hiding techniques, they could be classified according to the
   media where the information are hidden. First, Hiding in Text, methods such as line-shift
   coding, word shift coding, and feature coding are the commonly used methods to hide
   data in text. When using a text data as a host media, the embedded data are usually
                                                 230
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME

codeword that are hidden within the text by altering their different textual features [1].
Second, data hiding in image, the least significant bit insertion method is a common
simple approach for embedding information in image file. When applying LSB insertion
method on each byte of a 24-bit image, three bits can be encoded into each pixel (because
each pixel is represented by three bytes). Any changes in the pixel bits will be
indiscernible to the human eye. When using LSB techniques on 8-bit color images (i.e.,
palate driven), more care need to be taken. So, for 8-bit images only the grey images are
recommended for data hiding [2].
         Three different aspects in information hiding systems contend with each other:
capacity, security, and robustness. All steganographic methods have to comply be applied
with a few basic requirements (i.e., invisibility, payload capacity, robustness against
statistical attacks, robustness against image manipulation, independent of file format, and
unsuspicious files [3].

2. RELATED WORK

       Hiding data is the process of embedding information into digital content without
causing perceptual degradation [4]. In data hiding, three famous techniques can be used.
They are watermarking, steganography and cryptography. Steganography is defined as
covering writing in Greek. It includes any process that deals with data or information
within other data. According to Lou et al. [5], steganography is hiding the existence of a
message by hiding information into various carriers. The major intent is to prevent the
detection of hidden information. Research in steganography technique has been done
back in ancient Greek where during that time the ancient Greek practice of tattooing a
secret message on the shaved head of a messenger, and letting his hair grow back before
sending him through enemy territory where the latency of this communications system
was measured in months [6]. However, the majority of the development and use of
computerized steganography only occurred in year 2000 [7]. There are several
steganography techniques used for hiding data such as batch steganography, permutation
stehanography, least significant bits (LSB), bit-plane complexity segmentation (BPCS)
and chaos based spread spectrum image steganography (CSSIS).

3. PROPOSED METHODS FOR HIDING IMAGE IN IMAGE

   3.1 4 bit data hiding method

   Each pixel contains 8 bits, the right most bit is Least Significant Bit (LSB) and left
   most bit is (Most Significant Bit) MSB. Four bit data hiding method, which embeds
   first four MSB bits (MSB,MSB-1,MSB-2,MSB-3) of secret image into last four LSB
   bits (LSB, LSB+1, LSB+2,LSB+3) of cover image. So last 4 bits of cover image is
   replace with first four bits of secret image. Now next pixel of cover image is taken
   and again 4 MSB bits of next pixel of secret image is inserted into 4 LSB bits of cover
   image.



                                              231
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME



                                      Cover image
          Pixel 1                         Pixel 2        Pixel 3
    1 0 1 1 0 0             1    1 1 1 0 1 0 1 1 0 0 1 0 0 1 0 0 1
             LS LS          LS
                               LS
             B+ B+          B+
                               B
              3 2            1


                     Secret image
           Pixel 1        Pixel 2        Pixel 3
   1 0 0 0 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 0 1 1 0 0
   MS MS MS MS
   B B-1 B-2 B-3


                                         Stego image
                Pixel 1                   Pixel 2          Pixel 3
    1   0   1   1 1 0       0   0    1 1 0 1 0 1 0 1 0 1 0 0 1 1 0 0

                            Fig.1. Data hiding process using 4 bit method

       In this method only 4 MSB bits of each pixel of secret image is considered. Because
   of Lower bits of pixel is not contain more information here we omit remaining four bits
   (LSB, LSB+1, LSB+2, LSB+3) of secret image. The data to be hidden is converted to
   binary form. In Fig.1 gray shad shows that the last 4 LSB bit of cover image is replace
   with first 4 MSB bits of secret image. Image processing fundamental said that (‘LSB
   contain less information’), so if we change LSB data it not disturb the quality of image. In
   proposed method we omit last 4 bits LSB of each Pixel from secret image. Now next
   pixel of cover image is taken for data hiding. The manipulation of the three bit alters the
   color of the pixel, but this manipulate change cannot easily be perceived by the human
   eye.

   3.2 6 bit data hiding method

       Six bit data hiding method embeds first three MSB bits (MSB, MSB-1, MSB-2) of
   secret image into last three LSB bits (LSB, LSB+1, LSB+2) of cover image. Again three
   bits of secret image (MSB-3, MSB-4, MSB-5) is stored in 3 LSB bits of next pixel of
   cover image. So we are hiding total six MSB bits of secret image into cover image. Cover
   image embeds three bit data in each pixel byte. The data to be hidden is converted to
   binary form. In Fig.2 gray shad shows that the last 3 LSB bit of cover image is replace
   with first 3 MSB bits (1, 0, 0) of secret image. From MSB-3, next 3 bits (0, 0, 0) from
   Pixel 1 of Secret image is stored into 3 LSB bits of cover image Pixel 2. In proposed
   method we omit last 2bits LSB of each Pixel from secret image.



                                              232
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME



                                        Cover image
                Pixel 1                     Pixel 2        Pixel 3
    1   0   1   1 0 0        1 1      1 1 0 1 0 1 1 0 0 1 0 0 1 0 0 1
                       LS    LS
                                LS
                       B+    B+
                                B
                        2     1


                                     Secret image
            Pixel 1                        Pixel 2       Pixel 3
   1 0 0 0 0 0                 1 1 0 1 0 1 1 1 0 0 1 1 0 0 1 1 0 0
   MS MS MS MS MS MS
   B B-1 B-2 B-3 B-4 B-5


                                           Stego image
                Pixel 1                         Pixel 2                   Pixel 3
   1    0   1   1 0 1         0 0 1 1 0 1 0 0 0 0 0 1 0 0 1 0 1 0
                            Fig.2. Data hiding process using 3 bit method


4. PSNR CALCULATION

        We then tested the algorithm using the PSNR (Peak signal-to-noise ratio). PSNR is a
standard measurement used in steganograpy technique in order to test the quality of the stego
images. The higher the value of PSNR, the more quality the stego image will have. If the
cover image is C of size M × M and the stego image is S of size N × N, then each cover
image C and stego image S will have pixel value (x, y) from 0 to M-1 and 0 to N-1
respectively. The PSNR is then calculated as follows:
                                      ࡾ૛                     ∑    ሾࡵ ሺ࢓,࢔ሻିࡵ ሺ࢓,࢔ሻሿ૛
                ࡼࡿࡺࡾ ൌ ૚૙ ‫ ܏ܗܔ‬૚૙ ቀࡹࡿࡱቁ Where ࡹࡿࡱ ൌ ࡹ,ࡺ ૚ ࡹ‫ ࡺכ‬૛
        Note that R is the maximum possible pixel value of the images. For example, if the
pixels are represented using 8 bits per sample, then the R value is 255. If the stego image has
a higher PSNR value, then the stego image has more quality image.

5. RESULTS

   5.1. 4 bit data hiding method
               Fig. 3 shows the application of this method. We have cover image as lena
   (size: 512x512) and secret image as cameraman (size: 256x256). Fig 3 shows stegno
   image after hidden image stored in cover image. We get index 143 (at location X=32,
   Y=100) for cover image while we get index 138 (at location X=32, Y=100) for stegno
   image i.e. index is changed. Also we get PSNR is equal to 38.41 dB.


                                               233
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME




                       Fig: 3 Four bit data Hiding Method Results


   5.2. 6 bit data hiding method




                       Fig: 4 Six bit data Hiding Method Results

       Fig 4 shows the application of this method. Once again we select lena as cover image
   and cameraman as secret image. And execute the algorithm. As shown in Fig 4 we get
   index 143 (at location X=32, Y=100) for cover image while we get index 141 (at location
   X=32, Y=100) for stegno image i.e. index is changed. Also we get PSNR is equal to
   41.38 dB. We get better quality of stego image compare to 4 bit method since we are
   using 3 bits to embed data. Also the quality of received image is better than that of 4 bit
   method because 6 bits of original image is used instead of 4 bits.
                                              234
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME

6. CONCLUSION

       Results indicate that 6 bit data hiding method perform better than 4 bit data hiding
method. We have less data hiding capacity in 6 bit data hiding method but at the same time
we get better stego image & higher PSNR. When applying 6 bit data hiding method on each
byte of a 24-bit image, nine bits can be encoded into each pixel (because each pixel is
represented by three bytes). Also for 8-bit image, 3 bits can be encoded into each pixel. In
this method any changes in the pixel bits will be barely visible to the human eye.

REFERENCES

 [1] Jawad M. J., ”Hiding Audio Using Wavelet Transform”,M.Sc. thesis, college of science,
     Al-Nahrain University, Iraq, 2005.
 [2] Kessler G. C., “Hiding Data Within Data”, paper, Champlain College in Burlington,
     2001. http://www.garykessler.net/library/steganography.html
 [3] Morkel T., Eloff J. H. P., and Olivier M. S., “An Overview of Image Steganography”,
     Information and Computer Security Architecture (ICSA) Research Group, University of
     Pretoria, South Africa, 2005.
 [4] M. Chen, N. Memon, E.K. Wong, Data hiding in document images, in: H. Nemati (Ed.).
     Premier Reference Source–Information Security and Ethics: Concepts, Methodologies,
     Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450.
 [5] D.C. Lou, J.L. Liu, H.K. Tso, Evolution of information – hiding technology, in H. Nemati
     (Ed.), Premier Reference Source–Information Security and Ethics: Concepts,
     Methodologies, Tools and Applications, New York: Information Science Reference,
     2008, pp. 438-450.
 [6] Schneider, Secrets & Lies, Indiana:Wiley Publishing, 2000.
 [7] E. Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication,
     Indianapolis: Wiley Publishing, 2003.
 [8] Nagham Hamid, Abid Yahya ,R. Badlishah Ahmad and Osamah M. Al-Qershi, “An
     Improved Robust And Secured Image Steganographic Scheme” International journal of
     Electronics and Communication Engineering &Technology (IJECET), Volume 3, Issue 3,
     2012, pp. 22 - 33, Published by IAEME.
 [9] R. Pushpavalli and G.Sivaradjei, “Nonlinear Filtering Technique For Preserving Edges
     and Fine Details of Digital Images” International journal of Electronics and
     Communication Engineering &Technology (IJECET), Volume 3, Issue 1, 2012,
     pp. 29-40, Published by IAEME.
[10] Ankit Vidyarthi and Ankita Kansal, “A Survey Report On Digital Images Segmentation
      Algorithms” International journal of Computer Engineering & Technology (IJCET),
      Volume 3, Issue 2, 2012, pp. 85 - 91, Published by IAEME.
[11] Miss. Vismita Nagrale, Mr. Ganesh Zambre and Mr. Aamir Agwani, “Image Stegano-
     Cryptography Based on LSB Insertion & Symmetric Key Encryption” International
     journal of Electronics and Communication Engineering &Technology (IJECET),
     Volume 2, Issue 1, 2011, pp. 35-42, Published by IAEME.




                                              235

Contenu connexe

Tendances

Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab viewIJARIIT
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsEswar Publications
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptographyeSAT Publishing House
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...IRJET Journal
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAlexander Decker
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniqueseSAT Publishing House
 

Tendances (12)

L045056469
L045056469L045056469
L045056469
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Implementation of image steganography using lab view
Implementation of image steganography using lab viewImplementation of image steganography using lab view
Implementation of image steganography using lab view
 
Image Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime PixelsImage Cryptography using Nearest Prime Pixels
Image Cryptography using Nearest Prime Pixels
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
50120140501019
5012014050101950120140501019
50120140501019
 
D0341829
D0341829D0341829
D0341829
 
A comparatively study on visual cryptography
A comparatively study on visual cryptographyA comparatively study on visual cryptography
A comparatively study on visual cryptography
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
An enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hidingAn enhanced least significant bit steganographic method for information hiding
An enhanced least significant bit steganographic method for information hiding
 
Digital image compression techniques
Digital image compression techniquesDigital image compression techniques
Digital image compression techniques
 

En vedette (7)

Reação química
Reação químicaReação química
Reação química
 
Planificación textos normativos
Planificación textos normativosPlanificación textos normativos
Planificación textos normativos
 
Fa
FaFa
Fa
 
Jsf
JsfJsf
Jsf
 
WilmaSPEC
WilmaSPECWilmaSPEC
WilmaSPEC
 
Presentación general del OECC de la Universidad del Norte (2009-2013)
Presentación general del OECC de la Universidad del Norte (2009-2013)Presentación general del OECC de la Universidad del Norte (2009-2013)
Presentación general del OECC de la Universidad del Norte (2009-2013)
 
Presentació1
Presentació1Presentació1
Presentació1
 

Similaire à Concealogram digital image in image using lsb insertion method

Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...ijsptm
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingIRJET Journal
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLABVijayMaheshwari12
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionDr. Amarjeet Singh
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...Budi Prasetiyo
 

Similaire à Concealogram digital image in image using lsb insertion method (20)

Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
A Survey of Image Based Steganography
A Survey of Image Based SteganographyA Survey of Image Based Steganography
A Survey of Image Based Steganography
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
Encrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image SlicingEncrypting and Decrypting Message via Image Slicing
Encrypting and Decrypting Message via Image Slicing
 
Image Steganography using MATLAB
Image Steganography using MATLABImage Steganography using MATLAB
Image Steganography using MATLAB
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Ijetcas14 335
Ijetcas14 335Ijetcas14 335
Ijetcas14 335
 
Implementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB InsertionImplementation of Steganographic Model using Inverted LSB Insertion
Implementation of Steganographic Model using Inverted LSB Insertion
 
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED  STEGANOGRAPHY AND CR...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
 

Plus de IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

Plus de IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Concealogram digital image in image using lsb insertion method

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN INTERNATIONAL JOURNAL OF ELECTRONICS AND 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), pp. 230-235 IJECET © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2012): 3.5930 (Calculated by GISI) ©IAEME www.jifactor.com CONCEALOGRAM: DIGITAL IMAGE IN IMAGE USING LSB INSERTION METHOD Reena M Patel1, D J Shah2 1 EC department, LDRP Institute of Technology & Research, Near ITI, Sector 15, Gandhinagar, Gujarat, India, 2 Principal, L C institute of technology, Bhandu 384124, Gujarat, India, ABSTRACT In this paper, the authors propose a new algorithm for an image hiding steganographic method or concealing digital image in a cover image is introduced, and implemented. The proposed algorithm uses binary codes and pixels inside an image. For proposed paper author used spatial domain approach. The algorithm tested to see the viability of the proposed algorithm. Here using different algorithm, same sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the images tested. Various parameters like robustness against attack, data hiding capacity and quality of stego image are also considered. Hence this new steganography algorithm is very efficient to hide the digital image inside the image. Keywords: cover image, image processing, LSB insertion, Steganography, stegoimage 1. INTRODUCTION Steganography is the science of hiding information. The goal of steganography is to hide the information and be undetectable to human eyes. Steganography focuses on the means of communication and the development of a covert channel. Steganography focuses entirely on keeping the adversary completely unaware of the communication. There are several information hiding techniques, they could be classified according to the media where the information are hidden. First, Hiding in Text, methods such as line-shift coding, word shift coding, and feature coding are the commonly used methods to hide data in text. When using a text data as a host media, the embedded data are usually 230
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME codeword that are hidden within the text by altering their different textual features [1]. Second, data hiding in image, the least significant bit insertion method is a common simple approach for embedding information in image file. When applying LSB insertion method on each byte of a 24-bit image, three bits can be encoded into each pixel (because each pixel is represented by three bytes). Any changes in the pixel bits will be indiscernible to the human eye. When using LSB techniques on 8-bit color images (i.e., palate driven), more care need to be taken. So, for 8-bit images only the grey images are recommended for data hiding [2]. Three different aspects in information hiding systems contend with each other: capacity, security, and robustness. All steganographic methods have to comply be applied with a few basic requirements (i.e., invisibility, payload capacity, robustness against statistical attacks, robustness against image manipulation, independent of file format, and unsuspicious files [3]. 2. RELATED WORK Hiding data is the process of embedding information into digital content without causing perceptual degradation [4]. In data hiding, three famous techniques can be used. They are watermarking, steganography and cryptography. Steganography is defined as covering writing in Greek. It includes any process that deals with data or information within other data. According to Lou et al. [5], steganography is hiding the existence of a message by hiding information into various carriers. The major intent is to prevent the detection of hidden information. Research in steganography technique has been done back in ancient Greek where during that time the ancient Greek practice of tattooing a secret message on the shaved head of a messenger, and letting his hair grow back before sending him through enemy territory where the latency of this communications system was measured in months [6]. However, the majority of the development and use of computerized steganography only occurred in year 2000 [7]. There are several steganography techniques used for hiding data such as batch steganography, permutation stehanography, least significant bits (LSB), bit-plane complexity segmentation (BPCS) and chaos based spread spectrum image steganography (CSSIS). 3. PROPOSED METHODS FOR HIDING IMAGE IN IMAGE 3.1 4 bit data hiding method Each pixel contains 8 bits, the right most bit is Least Significant Bit (LSB) and left most bit is (Most Significant Bit) MSB. Four bit data hiding method, which embeds first four MSB bits (MSB,MSB-1,MSB-2,MSB-3) of secret image into last four LSB bits (LSB, LSB+1, LSB+2,LSB+3) of cover image. So last 4 bits of cover image is replace with first four bits of secret image. Now next pixel of cover image is taken and again 4 MSB bits of next pixel of secret image is inserted into 4 LSB bits of cover image. 231
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME Cover image Pixel 1 Pixel 2 Pixel 3 1 0 1 1 0 0 1 1 1 1 0 1 0 1 1 0 0 1 0 0 1 0 0 1 LS LS LS LS B+ B+ B+ B 3 2 1 Secret image Pixel 1 Pixel 2 Pixel 3 1 0 0 0 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 0 1 1 0 0 MS MS MS MS B B-1 B-2 B-3 Stego image Pixel 1 Pixel 2 Pixel 3 1 0 1 1 1 0 0 0 1 1 0 1 0 1 0 1 0 1 0 0 1 1 0 0 Fig.1. Data hiding process using 4 bit method In this method only 4 MSB bits of each pixel of secret image is considered. Because of Lower bits of pixel is not contain more information here we omit remaining four bits (LSB, LSB+1, LSB+2, LSB+3) of secret image. The data to be hidden is converted to binary form. In Fig.1 gray shad shows that the last 4 LSB bit of cover image is replace with first 4 MSB bits of secret image. Image processing fundamental said that (‘LSB contain less information’), so if we change LSB data it not disturb the quality of image. In proposed method we omit last 4 bits LSB of each Pixel from secret image. Now next pixel of cover image is taken for data hiding. The manipulation of the three bit alters the color of the pixel, but this manipulate change cannot easily be perceived by the human eye. 3.2 6 bit data hiding method Six bit data hiding method embeds first three MSB bits (MSB, MSB-1, MSB-2) of secret image into last three LSB bits (LSB, LSB+1, LSB+2) of cover image. Again three bits of secret image (MSB-3, MSB-4, MSB-5) is stored in 3 LSB bits of next pixel of cover image. So we are hiding total six MSB bits of secret image into cover image. Cover image embeds three bit data in each pixel byte. The data to be hidden is converted to binary form. In Fig.2 gray shad shows that the last 3 LSB bit of cover image is replace with first 3 MSB bits (1, 0, 0) of secret image. From MSB-3, next 3 bits (0, 0, 0) from Pixel 1 of Secret image is stored into 3 LSB bits of cover image Pixel 2. In proposed method we omit last 2bits LSB of each Pixel from secret image. 232
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME Cover image Pixel 1 Pixel 2 Pixel 3 1 0 1 1 0 0 1 1 1 1 0 1 0 1 1 0 0 1 0 0 1 0 0 1 LS LS LS B+ B+ B 2 1 Secret image Pixel 1 Pixel 2 Pixel 3 1 0 0 0 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 0 1 1 0 0 MS MS MS MS MS MS B B-1 B-2 B-3 B-4 B-5 Stego image Pixel 1 Pixel 2 Pixel 3 1 0 1 1 0 1 0 0 1 1 0 1 0 0 0 0 0 1 0 0 1 0 1 0 Fig.2. Data hiding process using 3 bit method 4. PSNR CALCULATION We then tested the algorithm using the PSNR (Peak signal-to-noise ratio). PSNR is a standard measurement used in steganograpy technique in order to test the quality of the stego images. The higher the value of PSNR, the more quality the stego image will have. If the cover image is C of size M × M and the stego image is S of size N × N, then each cover image C and stego image S will have pixel value (x, y) from 0 to M-1 and 0 to N-1 respectively. The PSNR is then calculated as follows: ࡾ૛ ∑ ሾࡵ ሺ࢓,࢔ሻିࡵ ሺ࢓,࢔ሻሿ૛ ࡼࡿࡺࡾ ൌ ૚૙ ‫ ܏ܗܔ‬૚૙ ቀࡹࡿࡱቁ Where ࡹࡿࡱ ൌ ࡹ,ࡺ ૚ ࡹ‫ ࡺכ‬૛ Note that R is the maximum possible pixel value of the images. For example, if the pixels are represented using 8 bits per sample, then the R value is 255. If the stego image has a higher PSNR value, then the stego image has more quality image. 5. RESULTS 5.1. 4 bit data hiding method Fig. 3 shows the application of this method. We have cover image as lena (size: 512x512) and secret image as cameraman (size: 256x256). Fig 3 shows stegno image after hidden image stored in cover image. We get index 143 (at location X=32, Y=100) for cover image while we get index 138 (at location X=32, Y=100) for stegno image i.e. index is changed. Also we get PSNR is equal to 38.41 dB. 233
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME Fig: 3 Four bit data Hiding Method Results 5.2. 6 bit data hiding method Fig: 4 Six bit data Hiding Method Results Fig 4 shows the application of this method. Once again we select lena as cover image and cameraman as secret image. And execute the algorithm. As shown in Fig 4 we get index 143 (at location X=32, Y=100) for cover image while we get index 141 (at location X=32, Y=100) for stegno image i.e. index is changed. Also we get PSNR is equal to 41.38 dB. We get better quality of stego image compare to 4 bit method since we are using 3 bits to embed data. Also the quality of received image is better than that of 4 bit method because 6 bits of original image is used instead of 4 bits. 234
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME 6. CONCLUSION Results indicate that 6 bit data hiding method perform better than 4 bit data hiding method. We have less data hiding capacity in 6 bit data hiding method but at the same time we get better stego image & higher PSNR. When applying 6 bit data hiding method on each byte of a 24-bit image, nine bits can be encoded into each pixel (because each pixel is represented by three bytes). Also for 8-bit image, 3 bits can be encoded into each pixel. In this method any changes in the pixel bits will be barely visible to the human eye. REFERENCES [1] Jawad M. J., ”Hiding Audio Using Wavelet Transform”,M.Sc. thesis, college of science, Al-Nahrain University, Iraq, 2005. [2] Kessler G. C., “Hiding Data Within Data”, paper, Champlain College in Burlington, 2001. http://www.garykessler.net/library/steganography.html [3] Morkel T., Eloff J. H. P., and Olivier M. S., “An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, University of Pretoria, South Africa, 2005. [4] M. Chen, N. Memon, E.K. Wong, Data hiding in document images, in: H. Nemati (Ed.). Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450. [5] D.C. Lou, J.L. Liu, H.K. Tso, Evolution of information – hiding technology, in H. Nemati (Ed.), Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450. [6] Schneider, Secrets & Lies, Indiana:Wiley Publishing, 2000. [7] E. Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Indianapolis: Wiley Publishing, 2003. [8] Nagham Hamid, Abid Yahya ,R. Badlishah Ahmad and Osamah M. Al-Qershi, “An Improved Robust And Secured Image Steganographic Scheme” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 3, Issue 3, 2012, pp. 22 - 33, Published by IAEME. [9] R. Pushpavalli and G.Sivaradjei, “Nonlinear Filtering Technique For Preserving Edges and Fine Details of Digital Images” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 3, Issue 1, 2012, pp. 29-40, Published by IAEME. [10] Ankit Vidyarthi and Ankita Kansal, “A Survey Report On Digital Images Segmentation Algorithms” International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 85 - 91, Published by IAEME. [11] Miss. Vismita Nagrale, Mr. Ganesh Zambre and Mr. Aamir Agwani, “Image Stegano- Cryptography Based on LSB Insertion & Symmetric Key Encryption” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 2, Issue 1, 2011, pp. 35-42, Published by IAEME. 235