SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
ISSN: 2319 – 4200, ISBN No. : 2319 – 4197 Volume 1, Issue 5 (Jan. - Feb 2013), PP 25-31
www.iosrjournals.org
www.iosrjournals.org 25 | Page
A novel image hiding scheme by Optimal Pixel Pair Matching and
Diamond Encoding
Rajashree Shitole1
, Satish Todmal2
1
(Department of Electronics & Telecommunication Engineering, University of Pune, India)
2
(Department of Information Technology, Imperial College of Engineering & Research, India)
Abstract: This paper describes a novel method of data embedding based on Pixel Pair
Matching(PPM).In Optimal Pixel Adjustment Process (OPAP),pixel x is embedded in k-bits of
message m , using Least Significant Bit (LSB) substitution method by adjusting stego pixel at optimal
level. In Diamond Encoding (DE), Diamond Characteristic Value, conceals secret digit in N-ary
notational system when k ≥ 1.Comparison and Experimental results of OPAP and DE not only
demonstrates acceptable image quality but also provides significant improvements for different
payloads. Diamond shape reveals that it is selective to specific notational system but large amount of
data can be embedded in the cover image maintaining imperceptible stego-image quality.
Keywords – Diamond Encoding (DE), Exploiting Modification Direction (EMD), Least Significant Bit
(LSB), Optimal Pixel Adjustment Process (OPAP), Pixel Pair Matching (PPM).
I. Introduction
Data hiding is a technique which imperceptibly embeds important data into media such as images,
voice, documents, etc. Data Hiding is defined by T. Morkel as follows, “Steganography is art and science of
invisible communication.” Since, images are popular media on internet; they are majorly used as cover media
for secret communication. The image which is used to hide the data is called cover image/ host image. Image in
which data is hidden is called stego image and image which is to be concealed in the cover image is called as
secret image. Acceptable data hiding provides large amount of data to be embedded in the cover image
maintaining quality of stego image.
The most popular method of data hiding is Least Significant Bit method. There are basically two types
of LSB methods LSB replacement and LSB matching. In both the cases data to be hidden is represented in
binary form. Amount of data that can be embedded is called as embedding capacity and distortion present
during embedding is called as embedding distortion. LSB method has average embedding capability. In this
method each pixel of cover image is compared with data to be hidden depending upon even and odd values of
pixels, they are increased or decreased respectively or kept unmodified. But because of this method, distortion
during embedding increases, and results in degradable image quality. It becomes very easy to detect the change
in values, because all these operations are performed on Least significant Bit [1][2] . In, 2001 Rang-Zan Wang
et al. [3] proposed image data hiding scheme by optimal LSB substitution and genetic algorithm. But when this
algorithm was implemented, Signal to Noise Ratio (SNR) obtained was much less than LSB substitution in
some cases. Due to LSB replacement, embedding distortion increases, hence OPAP is conceptually defined as
matching pixel to its optimal level was introduced. Basic concept of Pixel Pair Matching is to provide a new
value of pixel pair with respect to value of reference pixel pair according to the secret message digit and new
value of pixel pair is replaced by secret digit. In other words pixel pair is used for embedding, first pixel is used
to carry one message bit and second pixel carries binary function related to it. In 2006, Mielikainen [4][5]
proposed LSB matching method but here, two pixels were used to carry two bits. Therefore, error calculated is
(3/4)*(12
/2) = 0.315 of 1bpp [5].Where as LSB error is 0.5. in the same year Xinpeng Zhang et al. proposed
EMD. In this method, each secret digit present in (2n+1)-ary notational system where n = system parameter of
cover pixels. Secret message is in binary form but when it is represented in decimal form or value, each secret
digit is represented by K, in a (2n+1)-ary notational system. In EMD, instead of payload image quality is
enhanced.
The rest of this paper is organized as follows. Section II gives review of Exploiting Modification (EM)
direction embedding skill. Section III will give framework of implemented method called Optimal Pixel
Adjustment Process (OPAP). Section IV will present implementation of Diamond Encoding (DE). Quality
analysis and comparison of OPAP and DE in terms of SNR is presented in Section V. Section VI includes
Conclusions and Remarks.
A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding
www.iosrjournals.org 26 | Page
II. Review Of The Exploiting Modification Direction Embedding Scheme
The EMD method was proposed by Xinpeng Zhang et al. in 2006, which enhanced the image quality of
stego image by fully exploiting the modification direction. The EMD method is described in [6][7]. The basic
concept of EMD is n cover pixels carry (2n+1)-ary notational secret digit and only one pixel value is changed
i.e. increased or decreased by 1. In n cover pixels, for one pixel 2n states are possible pixel value 1 is added or
subtracted. But if no pixels are modified (2n+1) different cases are obtained. Secret message (binary form) is
segmented to L bits where L is given as
L= [K*log2(2n+1)] (1)
For eg.
Secret message bits (1101 0110 1001) is segment as (23 11 14) in 5-ary rotational system where L=4 and K=2.
Let Px1, Px2,...Pxn denote value of pixel in a group extraction function (f) is given as follows
f (Px1, Px2...Pxn) = [ 𝑛
𝑖=0 Pxi*i ] (2)
If n=2,
f (Px1, Px2,) = [ 1
𝑖=0 (Pxi*i) mod (2n+1)] (3)
= [ 1
𝑖=0 (Pxi*i) mod 5 ]
In EMD payload cannot be increased and it is limited to 5-ary notational system. For extraction, more
than one pixel needs to be modified, which affects overall performance. Hence OPAP is introduced.
III. Optimal Pixel Adjustment Process (OPAP)
This section describes the implemented technique based on PPM. Consider Pxi, Pxi ʹ, Pxi″ represent
pixel values at ith
pixel in the host image H, stego image is given as S. Stego image S is calculated by LSB
substitution method. It is basically represented in [8]. LSB substitution works as follows[4][5]
Let,
δi =Pxiʹ- Pxi (4)
where, δi = embedding error
Cover or host image of M*N pixels is represented as
H = xij Ε{0,1,...255}
Secret message M in K secret bit is
m = {mi | 0 ≤ i < n, mi Є {0, 1}} (5)
Secret message is rearranged to form a virtual message of K-bit is denoted mʹ
mʹ= {miʹ| 0 ≤ i < nʹ, miʹЄ {0, 1.....2k-1
}} (6)
where, nʹ=M*N
For embedding LSB substitution method is used
mʹ= { miʹ}
miʹ= 𝑘−1
𝑖=0 mi * k + j ʹ2k-1-j
(7)
Therefore Stego image comprises of chosen pixel value xli which stores K-bit of message miʹ. Stego pixel is
denoted by
xliʹ= xli - xli*mod*2k
+miʹ (8)
Therefore Pxi is nothing but xliʹ. K is directly replaced by LSB of Pxi with secret message bit.
-2k
< δi < 2k
(9)
Therefore to convert Pxiʹto Pxiʹʹi.e. original pixel to stego pixel three cases are defined.
Case 1: (2k-1
< δi < 2k
)
Pxiʹʹ= Pxiʹ- 2k
; Pxiʹ≥ 2k
= Pxiʹ ; otherwise
A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding
www.iosrjournals.org 27 | Page
Case 2: (-2k-1
≤ δi ≤ 2k-1
)
Pxiʹʹ= Pxiʹ ; for all
Case 3: (-2k
< δi < -2k-1
)
Pxiʹʹ= Pxiʹ+2k
; Pxiʹ< 256- 2k
= Pxiʹ ; otherwise
So for optimal pixel pair matching, P = pixel value, rLSB = rightmost bit of v, Pʹ= pixel value after
embedding rLSB using LSB substitutions described above (8). Aim of OPAP is to adjust P; to its optimal level
by decreasing embedding distortion.
Pʹ+ 2rLSB
; PrLSB
- S > 2r-1
& Pʹ+ 2rLSB
≤ 255
Pʹʹ = Pʹ– 2rLSB
; PrLSB
- S > -2r-1
& Pʹʹʹ2rLSB
≥ 0
Pʹ ; otherwise
After embedding if value of P =160 is changed to Pʹʹ= 157 according to the above stated conditions.
It is proved that pixel pair is matched at optimum level. If last three bits of Pʹʹare extracted, embedded data
can be extracted very easily. But as value of K increases more than four, OPAP starts degrading the image
quality.
IV. Diamond Encoding (De)
The basic concept of DE is based on Pixel Pair Matching. It is an extension of EMD method described
in section II[7]. DE is used to conceal the secret digit in N-ary notational system into pixel pair where N = 2k2
+
2k + 1 when k ≥ 1, where k is embedding parameter. Diamond Characteristic value is calculated so that one
secret N-ary digit is concealed.
Consider, size of cover image is m*m and secret message digit is DN, N stands for N-ary notational system. But
embedding parameter k should satisfy the following condition:
[
𝑚∗𝑚
2
] ≥ |SN| (10)
Where, |SN| represents no. of secret message digits in N-ary notational system. Let a, b, x and y be pixel values,
the new set of pixel value which is to be found is called neighbourhood set denoted by Sk (x, y), (a, b) is set of
coordinates whose distance (x, y) is less than or equal to k.
Sk (x, y) = { (a, b) | |a - x| + |b - y| ≤ k } (11)
|Sk| gives us value of embedded base with parameter k. Value of |Sk| is defined by embedding parameter k, when
k=1, 2, 3....N; Sk obtained will be|S1|=5, |S2|=13, |S3|=25....and so on respectively.
|Sk| = [( (2𝑖 + 1)𝑘
𝑖=0 ) + ( 2𝑖 − 1𝑘
𝑖=1 )]
=1+ [( (2𝑖 + 1)𝑘
𝑖=1 ) + ( 2𝑖 − 1𝑘
𝑖=1 )]
= 1+ [ (4𝑖)]𝑘
𝑖=1
=1+
𝑘 𝑘+1
2
* 4
= 1+ 2k (k+1)
= 2k2
+ 2k + 1 (12)
Now, DCV is calculated for embedding and extracting process by using diamond function f. DCV is calculated
as follows
f(x, y) = ( (2k + 1) * x + y) mod N (13)
{
A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding
www.iosrjournals.org 28 | Page
when f(xʹ, yʹ) = SB then (x, y) is replaced by under flowing or overflowing, (xʹ, yʹ) must be adjusted finely.
Thus, four conditions of adjustments are as follows
1. If xʹ > 255, xʹ= xʹ- N
2. If xʹ< 0, xʹ= xʹ+ N
3. If yʹ> 255, yʹ= yʹ- N
4. If yʹ< 0, yʹ= yʹ + N
In the diamond encoding method, when neighbourhood values are found, they form a diamond shape.
Payload is given by ½ log2 (2k2
+ 2k + 1) bpp. So, it is proved that, pixel vector (x, y) does not go beyond the
value embedding parameter k even after embedding is completed. It is concluded that maximum data can be
embedded in the cover image without degrading the quality of the stego image.
V. Quality Analysis and Comparison
Whenever any Stego image is created, some new data is embedded in the original/ cover or so called
Host image. Because of this embedding, pixel values are modified. To measure the quality of stego image SNR,
MSE, etc. are used. So, here, we are dealing SNR of OPAP and DE. SNR is defined as the ratio of signal to
noise between cover and stego image. Larger value of SNR denotes better stego image quality. Mathematically,
SNR is defined as follows
𝑆𝑁𝑅=
𝑚 −1
𝑥=0 𝑓1 𝑥,𝑦 ]𝑛−1
𝑦=0 2
𝑚 −1
𝑥=0 [𝑓1 𝑥,𝑦 −𝑓(𝑥,𝑦)]2𝑛−1
𝑦=0
Where,
f(x, y) =
𝑂𝑟𝑖𝑔𝑖𝑛𝑎𝑙 𝐼𝑚𝑎𝑔𝑒
𝐶𝑜𝑣𝑒𝑟 𝐼𝑚𝑎𝑔𝑒 𝑜𝑟 𝐻𝑜𝑠𝑡 𝐼𝑚𝑎𝑔𝑒
f1(x, y) =
𝑆𝑡𝑒𝑔𝑜 𝐼𝑚𝑎𝑔𝑒
𝑆𝑒𝑐𝑟𝑒𝑡 𝑜𝑟 𝐸𝑚𝑏𝑒𝑑𝑑𝑒𝑑 𝐼𝑚𝑎𝑔𝑒
SNR value in dB given by,
SNRdB = 10 log10SNR
1. Analysis of SNR
1.1 LSB Substitution[8]
When bit is embedded in ith
LSB, SNR is given as:
SNRLSB=
6
(4r−1)
1.2 Optimal Pixel Adjustment Process [3]
The probability of | P - Pʹʹ|lies in the range of [1, 2rLSB
- 1] is 1/2rLSB
:
SNROPAP =
12
(4rLSB +2)
1.3 Diamond Encoding [7]
Digits are embedded in N-ary notional system :
SNRDE =
12
1
2N
𝑘−𝑦
𝑥=𝑦−𝑘
𝑘
𝑦=0 (x2 + y2 ) +
𝑘−𝑦
𝑥=𝑦−𝑘
𝑘
𝑦=1 (x2 + y2 )
=
𝑘 𝑘+1 (𝑘²+𝑘+1)
3+6𝑘(𝑘+1)
Where,
x,y=New pixel pair which uses diamond shape,
xi and yi is reference co-ordinates,
k=Embedding parameter
A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding
www.iosrjournals.org 29 | Page
Table no.1 SNR of OPAP
Sr.
No.
Cover
image
Size of cover
image
(bits)
Secret image Size of secret image
(bits)
SNR with
OPAP
(db)
1. Baboon 500×500 Lena 250×250 35.406
2. Kelly 500×500 Lena 250×250 33.833
3. Baboon 500×500 Pepper 250×250 35.370
4. Kelly 500×500 Pepper 250×250 33.917
Table no.2 SNR of DE
Sr.
No.
Cover
image
Size of cover image
(bits)
Secret image Size of secret image
(bits)
SNR with
DE
(db)
1. Baboon 500×500 Lena 250×250 39.479
2. Kelly 500×500 Lena 250×250 38.003
3. Baboon 500×500 Pepper 250×250 39.485
4. Kelly 500×500 Pepper 250×250 37.992
It is clear from TABLE 1 and 2, large amount of data is embedded in cover image without losing
imperceptibility of the image. When the size of cover image and secret image is same, SNR is decreased. But
when secret image is less than cover image, the average value of SNR for DE according to readings in TABLE 2
is 38.739 whereas for OPAP is 34.631.Therefore we obtain acceptable image quality compared to LSB
substitution and EMD. It is also proved that number of bits which can be changed in OPAP is maximum 3and
for DE it is 8.Therefore large amount of data is embedded in DE compared to OPAP and EMD.
Table no. 3 SNR Comparison of DE with OPAP
Sr.
No.
Cover
image
Secret image SNR with
OPAP
(db)
SNR with DE
(db)
SNR improvement
of DE over OPAP
(db)
1. Baboon Lena 35.406 39.479 4.073
2. Kelly Lena 33.833 38.003 4.170
3. Baboon Pepper 35.370 39.485 4.115
4. Kelly Pepper 33.917 37.992 4.075
TABLE 3, indicates SNR comparison of OPAP and DE and SNR improvement of DE over OPAP.
From this comparison it is clear that DE outperforms EMD and OPAP outperforms LSB substitution in terms of
embedding efficiency, quality of stego image, etc. Fig. 1and Fig. 2 show the cover image Baboon and secret
image of Lena and Pepper using OPAP and DE respectively.
A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding
www.iosrjournals.org 30 | Page
i] ii] iii]
i] ii] iii]
Fig. 1. i] Cover image ii] Secret image and iii] Stego image by OPAP
i] ii] iii]
i] ii] iii]
Fig. 2. i] Cover image ii] Secret image and iii] Stego image by DE
From Fig.1 & 2 it is proved that DE gives better result compared to OPAP in terms of image quality.
V. Conclusion
This paper implements two efficient data embedding techniques. Optimal Pixel Adjustment Process
gives acceptable image quality as compared to Least Significant Bit substitution method whereas Diamond
Encoding enhances SNR.SNR improvement shown in TABLE 3 concludes DE outperforms OPAP as pixel
improvement is of minimum 4db. When an image having large areas with same color shades are used as cover
image, change in pixel can be easily detected in OPAP. Clearly, the embedding parameter k which is derived by
N-ary notational system in DE allows bit replacement up to 8 bits which is limited in OPAP. DE gives no
artifacts in stego image for specific value of k, and large amount of data can be embedded in cover image
maintaining stego image quality or imperceptibility of an image. DE gives comparatively a better performance
with respect to EMD, LSB substitution and OPAP. However with increasing values of k, pixel pair matching in
an adaptive manner can be considered as an alternate approach.
A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding
www.iosrjournals.org 31 | Page
References
[1] J. Fridrich, M. Golijan, and R. Du, “Reliable detection of LSB steganography in color and grayscale images,” in Proc. Int. Workshop
on Multimedia and Security, 2001, pp. 27-30
[2] A. D. Ker, “Steganalysis of LSB matching in grayscale images” IEEE Signal Process. Lett. vol. 12, no. 6, pp. 441-444, Jun. 2005
[3] Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition,
vol.34, no. 3, 671683, 2001
[4] C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” PatternRecognit. vol.
41, no.8, pp. 2674-2683, 2008
[5] J. Mielikainen, “LSB Matching revisited,” IEEE Signal Process. Lett. vol.13, no. 5, pp. 285-287, May 2006.
[6] J. Wang, Y Sun, H. Xu, K. Chen, H. J. Kim, and S. H. Joo, “An improved section wise exploiting modification direction method,”
Signal Process., vol. 90, no. 11, pp. 2954-2964, 2010.
[7] Xinpeng Zhang and Shuozhong Wang, “Efficient Steganographic embedding by exploiting modification direction,” IEEE
Communication Lett. Vol. 10, no.11, Nov. 2006
[8] Chi- Kwong Chan, L.M. Cheng, “Improved hiding data in images in optimal moderately significant bit replacement,” IEE electron.
Lett. 37, vol. 16, pp. 1017-1018, 2001.

Mais conteúdo relacionado

Mais procurados

An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmCSCJournals
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...IRJET Journal
 
GENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGGENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGEditor IJCATR
 
Image Reconstruction Using Sparse Approximation
Image Reconstruction Using Sparse ApproximationImage Reconstruction Using Sparse Approximation
Image Reconstruction Using Sparse ApproximationChristopher Neighbor
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
 
Image compression using Hybrid wavelet Transform and their Performance Compa...
Image compression using Hybrid wavelet Transform and their  Performance Compa...Image compression using Hybrid wavelet Transform and their  Performance Compa...
Image compression using Hybrid wavelet Transform and their Performance Compa...IJMER
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
 
Securing Biometric Images using Reversible Watermarking
Securing Biometric Images using Reversible WatermarkingSecuring Biometric Images using Reversible Watermarking
Securing Biometric Images using Reversible WatermarkingCSCJournals
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINijistjournal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Convolutional Neural Network (CNN) presentation from theory to code in Theano
Convolutional Neural Network (CNN) presentation from theory to code in TheanoConvolutional Neural Network (CNN) presentation from theory to code in Theano
Convolutional Neural Network (CNN) presentation from theory to code in TheanoSeongwon Hwang
 
改进的固定点图像复原算法_英文_阎雪飞
改进的固定点图像复原算法_英文_阎雪飞改进的固定点图像复原算法_英文_阎雪飞
改进的固定点图像复原算法_英文_阎雪飞alen yan
 
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONcsandit
 

Mais procurados (20)

2006 ssiai
2006 ssiai2006 ssiai
2006 ssiai
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
 
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding AlgorithmFixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
 
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
An Approach for Image Deblurring: Based on Sparse Representation and Regulari...
 
GENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKINGGENERIC APPROACH FOR VISIBLE WATERMARKING
GENERIC APPROACH FOR VISIBLE WATERMARKING
 
Image Reconstruction Using Sparse Approximation
Image Reconstruction Using Sparse ApproximationImage Reconstruction Using Sparse Approximation
Image Reconstruction Using Sparse Approximation
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
Image compression using Hybrid wavelet Transform and their Performance Compa...
Image compression using Hybrid wavelet Transform and their  Performance Compa...Image compression using Hybrid wavelet Transform and their  Performance Compa...
Image compression using Hybrid wavelet Transform and their Performance Compa...
 
Db Scan
Db ScanDb Scan
Db Scan
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
 
Securing Biometric Images using Reversible Watermarking
Securing Biometric Images using Reversible WatermarkingSecuring Biometric Images using Reversible Watermarking
Securing Biometric Images using Reversible Watermarking
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
Ai32237241
Ai32237241Ai32237241
Ai32237241
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Convolutional Neural Network (CNN) presentation from theory to code in Theano
Convolutional Neural Network (CNN) presentation from theory to code in TheanoConvolutional Neural Network (CNN) presentation from theory to code in Theano
Convolutional Neural Network (CNN) presentation from theory to code in Theano
 
改进的固定点图像复原算法_英文_阎雪飞
改进的固定点图像复原算法_英文_阎雪飞改进的固定点图像复原算法_英文_阎雪飞
改进的固定点图像复原算法_英文_阎雪飞
 
Optics
OpticsOptics
Optics
 
Dbscan algorithom
Dbscan algorithomDbscan algorithom
Dbscan algorithom
 
Wavelet
WaveletWavelet
Wavelet
 
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATIONA DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
A DIGITAL COLOR IMAGE WATERMARKING SYSTEM USING BLIND SOURCE SEPARATION
 

Destaque

Business Intelligence: A Rapidly Growing Option through Web Mining
Business Intelligence: A Rapidly Growing Option through Web  MiningBusiness Intelligence: A Rapidly Growing Option through Web  Mining
Business Intelligence: A Rapidly Growing Option through Web MiningIOSR Journals
 
A Novel approach for Graphical User Interface development and real time Objec...
A Novel approach for Graphical User Interface development and real time Objec...A Novel approach for Graphical User Interface development and real time Objec...
A Novel approach for Graphical User Interface development and real time Objec...IOSR Journals
 
GIZO/P(VDF-TrFE) based dual-channel ferroelectric-gate field-effect transisto...
GIZO/P(VDF-TrFE) based dual-channel ferroelectric-gate field-effect transisto...GIZO/P(VDF-TrFE) based dual-channel ferroelectric-gate field-effect transisto...
GIZO/P(VDF-TrFE) based dual-channel ferroelectric-gate field-effect transisto...IOSR Journals
 
Low Power Energy Harvesting & Supercapacitor Storage
Low Power Energy Harvesting & Supercapacitor StorageLow Power Energy Harvesting & Supercapacitor Storage
Low Power Energy Harvesting & Supercapacitor StorageIOSR Journals
 
Influence of soil texture and bed preparation on growth performance in Plectr...
Influence of soil texture and bed preparation on growth performance in Plectr...Influence of soil texture and bed preparation on growth performance in Plectr...
Influence of soil texture and bed preparation on growth performance in Plectr...IOSR Journals
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionIOSR Journals
 

Destaque (20)

Business Intelligence: A Rapidly Growing Option through Web Mining
Business Intelligence: A Rapidly Growing Option through Web  MiningBusiness Intelligence: A Rapidly Growing Option through Web  Mining
Business Intelligence: A Rapidly Growing Option through Web Mining
 
D0462530
D0462530D0462530
D0462530
 
A Novel approach for Graphical User Interface development and real time Objec...
A Novel approach for Graphical User Interface development and real time Objec...A Novel approach for Graphical User Interface development and real time Objec...
A Novel approach for Graphical User Interface development and real time Objec...
 
D0611923
D0611923D0611923
D0611923
 
J010525864
J010525864J010525864
J010525864
 
J012135863
J012135863J012135863
J012135863
 
J017256674
J017256674J017256674
J017256674
 
GIZO/P(VDF-TrFE) based dual-channel ferroelectric-gate field-effect transisto...
GIZO/P(VDF-TrFE) based dual-channel ferroelectric-gate field-effect transisto...GIZO/P(VDF-TrFE) based dual-channel ferroelectric-gate field-effect transisto...
GIZO/P(VDF-TrFE) based dual-channel ferroelectric-gate field-effect transisto...
 
P01061112116
P01061112116P01061112116
P01061112116
 
Low Power Energy Harvesting & Supercapacitor Storage
Low Power Energy Harvesting & Supercapacitor StorageLow Power Energy Harvesting & Supercapacitor Storage
Low Power Energy Harvesting & Supercapacitor Storage
 
D010212029
D010212029D010212029
D010212029
 
D01112030
D01112030D01112030
D01112030
 
A0150106
A0150106A0150106
A0150106
 
Influence of soil texture and bed preparation on growth performance in Plectr...
Influence of soil texture and bed preparation on growth performance in Plectr...Influence of soil texture and bed preparation on growth performance in Plectr...
Influence of soil texture and bed preparation on growth performance in Plectr...
 
I01045865
I01045865I01045865
I01045865
 
D01042335
D01042335D01042335
D01042335
 
F0153236
F0153236F0153236
F0153236
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion Recognition
 
D1304022532
D1304022532D1304022532
D1304022532
 
B0951117
B0951117B0951117
B0951117
 

Semelhante a E0152531

Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsIOSR Journals
 
6 one third probability embedding a new
6 one third probability embedding a new6 one third probability embedding a new
6 one third probability embedding a newAlok Padole
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed satIAESIJEECS
 
A fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodA fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodeSAT Journals
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...cscpconf
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Editor IJCATR
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsCSCJournals
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Pioneer Natural Resources
 

Semelhante a E0152531 (20)

Is3314841490
Is3314841490Is3314841490
Is3314841490
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixels
 
C010231217
C010231217C010231217
C010231217
 
6 one third probability embedding a new
6 one third probability embedding a new6 one third probability embedding a new
6 one third probability embedding a new
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
 
A fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching methodA fpga implementation of data hiding using lsb matching method
A fpga implementation of data hiding using lsb matching method
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
Bj31416421
Bj31416421Bj31416421
Bj31416421
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
Data Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image CryptosystemsData Steganography for Optical Color Image Cryptosystems
Data Steganography for Optical Color Image Cryptosystems
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...Detection and Classification in Hyperspectral Images using Rate Distortion an...
Detection and Classification in Hyperspectral Images using Rate Distortion an...
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Último (20)

So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

E0152531

  • 1. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) ISSN: 2319 – 4200, ISBN No. : 2319 – 4197 Volume 1, Issue 5 (Jan. - Feb 2013), PP 25-31 www.iosrjournals.org www.iosrjournals.org 25 | Page A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding Rajashree Shitole1 , Satish Todmal2 1 (Department of Electronics & Telecommunication Engineering, University of Pune, India) 2 (Department of Information Technology, Imperial College of Engineering & Research, India) Abstract: This paper describes a novel method of data embedding based on Pixel Pair Matching(PPM).In Optimal Pixel Adjustment Process (OPAP),pixel x is embedded in k-bits of message m , using Least Significant Bit (LSB) substitution method by adjusting stego pixel at optimal level. In Diamond Encoding (DE), Diamond Characteristic Value, conceals secret digit in N-ary notational system when k ≥ 1.Comparison and Experimental results of OPAP and DE not only demonstrates acceptable image quality but also provides significant improvements for different payloads. Diamond shape reveals that it is selective to specific notational system but large amount of data can be embedded in the cover image maintaining imperceptible stego-image quality. Keywords – Diamond Encoding (DE), Exploiting Modification Direction (EMD), Least Significant Bit (LSB), Optimal Pixel Adjustment Process (OPAP), Pixel Pair Matching (PPM). I. Introduction Data hiding is a technique which imperceptibly embeds important data into media such as images, voice, documents, etc. Data Hiding is defined by T. Morkel as follows, “Steganography is art and science of invisible communication.” Since, images are popular media on internet; they are majorly used as cover media for secret communication. The image which is used to hide the data is called cover image/ host image. Image in which data is hidden is called stego image and image which is to be concealed in the cover image is called as secret image. Acceptable data hiding provides large amount of data to be embedded in the cover image maintaining quality of stego image. The most popular method of data hiding is Least Significant Bit method. There are basically two types of LSB methods LSB replacement and LSB matching. In both the cases data to be hidden is represented in binary form. Amount of data that can be embedded is called as embedding capacity and distortion present during embedding is called as embedding distortion. LSB method has average embedding capability. In this method each pixel of cover image is compared with data to be hidden depending upon even and odd values of pixels, they are increased or decreased respectively or kept unmodified. But because of this method, distortion during embedding increases, and results in degradable image quality. It becomes very easy to detect the change in values, because all these operations are performed on Least significant Bit [1][2] . In, 2001 Rang-Zan Wang et al. [3] proposed image data hiding scheme by optimal LSB substitution and genetic algorithm. But when this algorithm was implemented, Signal to Noise Ratio (SNR) obtained was much less than LSB substitution in some cases. Due to LSB replacement, embedding distortion increases, hence OPAP is conceptually defined as matching pixel to its optimal level was introduced. Basic concept of Pixel Pair Matching is to provide a new value of pixel pair with respect to value of reference pixel pair according to the secret message digit and new value of pixel pair is replaced by secret digit. In other words pixel pair is used for embedding, first pixel is used to carry one message bit and second pixel carries binary function related to it. In 2006, Mielikainen [4][5] proposed LSB matching method but here, two pixels were used to carry two bits. Therefore, error calculated is (3/4)*(12 /2) = 0.315 of 1bpp [5].Where as LSB error is 0.5. in the same year Xinpeng Zhang et al. proposed EMD. In this method, each secret digit present in (2n+1)-ary notational system where n = system parameter of cover pixels. Secret message is in binary form but when it is represented in decimal form or value, each secret digit is represented by K, in a (2n+1)-ary notational system. In EMD, instead of payload image quality is enhanced. The rest of this paper is organized as follows. Section II gives review of Exploiting Modification (EM) direction embedding skill. Section III will give framework of implemented method called Optimal Pixel Adjustment Process (OPAP). Section IV will present implementation of Diamond Encoding (DE). Quality analysis and comparison of OPAP and DE in terms of SNR is presented in Section V. Section VI includes Conclusions and Remarks.
  • 2. A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding www.iosrjournals.org 26 | Page II. Review Of The Exploiting Modification Direction Embedding Scheme The EMD method was proposed by Xinpeng Zhang et al. in 2006, which enhanced the image quality of stego image by fully exploiting the modification direction. The EMD method is described in [6][7]. The basic concept of EMD is n cover pixels carry (2n+1)-ary notational secret digit and only one pixel value is changed i.e. increased or decreased by 1. In n cover pixels, for one pixel 2n states are possible pixel value 1 is added or subtracted. But if no pixels are modified (2n+1) different cases are obtained. Secret message (binary form) is segmented to L bits where L is given as L= [K*log2(2n+1)] (1) For eg. Secret message bits (1101 0110 1001) is segment as (23 11 14) in 5-ary rotational system where L=4 and K=2. Let Px1, Px2,...Pxn denote value of pixel in a group extraction function (f) is given as follows f (Px1, Px2...Pxn) = [ 𝑛 𝑖=0 Pxi*i ] (2) If n=2, f (Px1, Px2,) = [ 1 𝑖=0 (Pxi*i) mod (2n+1)] (3) = [ 1 𝑖=0 (Pxi*i) mod 5 ] In EMD payload cannot be increased and it is limited to 5-ary notational system. For extraction, more than one pixel needs to be modified, which affects overall performance. Hence OPAP is introduced. III. Optimal Pixel Adjustment Process (OPAP) This section describes the implemented technique based on PPM. Consider Pxi, Pxi ʹ, Pxi″ represent pixel values at ith pixel in the host image H, stego image is given as S. Stego image S is calculated by LSB substitution method. It is basically represented in [8]. LSB substitution works as follows[4][5] Let, δi =Pxiʹ- Pxi (4) where, δi = embedding error Cover or host image of M*N pixels is represented as H = xij Ε{0,1,...255} Secret message M in K secret bit is m = {mi | 0 ≤ i < n, mi Є {0, 1}} (5) Secret message is rearranged to form a virtual message of K-bit is denoted mʹ mʹ= {miʹ| 0 ≤ i < nʹ, miʹЄ {0, 1.....2k-1 }} (6) where, nʹ=M*N For embedding LSB substitution method is used mʹ= { miʹ} miʹ= 𝑘−1 𝑖=0 mi * k + j ʹ2k-1-j (7) Therefore Stego image comprises of chosen pixel value xli which stores K-bit of message miʹ. Stego pixel is denoted by xliʹ= xli - xli*mod*2k +miʹ (8) Therefore Pxi is nothing but xliʹ. K is directly replaced by LSB of Pxi with secret message bit. -2k < δi < 2k (9) Therefore to convert Pxiʹto Pxiʹʹi.e. original pixel to stego pixel three cases are defined. Case 1: (2k-1 < δi < 2k ) Pxiʹʹ= Pxiʹ- 2k ; Pxiʹ≥ 2k = Pxiʹ ; otherwise
  • 3. A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding www.iosrjournals.org 27 | Page Case 2: (-2k-1 ≤ δi ≤ 2k-1 ) Pxiʹʹ= Pxiʹ ; for all Case 3: (-2k < δi < -2k-1 ) Pxiʹʹ= Pxiʹ+2k ; Pxiʹ< 256- 2k = Pxiʹ ; otherwise So for optimal pixel pair matching, P = pixel value, rLSB = rightmost bit of v, Pʹ= pixel value after embedding rLSB using LSB substitutions described above (8). Aim of OPAP is to adjust P; to its optimal level by decreasing embedding distortion. Pʹ+ 2rLSB ; PrLSB - S > 2r-1 & Pʹ+ 2rLSB ≤ 255 Pʹʹ = Pʹ– 2rLSB ; PrLSB - S > -2r-1 & Pʹʹʹ2rLSB ≥ 0 Pʹ ; otherwise After embedding if value of P =160 is changed to Pʹʹ= 157 according to the above stated conditions. It is proved that pixel pair is matched at optimum level. If last three bits of Pʹʹare extracted, embedded data can be extracted very easily. But as value of K increases more than four, OPAP starts degrading the image quality. IV. Diamond Encoding (De) The basic concept of DE is based on Pixel Pair Matching. It is an extension of EMD method described in section II[7]. DE is used to conceal the secret digit in N-ary notational system into pixel pair where N = 2k2 + 2k + 1 when k ≥ 1, where k is embedding parameter. Diamond Characteristic value is calculated so that one secret N-ary digit is concealed. Consider, size of cover image is m*m and secret message digit is DN, N stands for N-ary notational system. But embedding parameter k should satisfy the following condition: [ 𝑚∗𝑚 2 ] ≥ |SN| (10) Where, |SN| represents no. of secret message digits in N-ary notational system. Let a, b, x and y be pixel values, the new set of pixel value which is to be found is called neighbourhood set denoted by Sk (x, y), (a, b) is set of coordinates whose distance (x, y) is less than or equal to k. Sk (x, y) = { (a, b) | |a - x| + |b - y| ≤ k } (11) |Sk| gives us value of embedded base with parameter k. Value of |Sk| is defined by embedding parameter k, when k=1, 2, 3....N; Sk obtained will be|S1|=5, |S2|=13, |S3|=25....and so on respectively. |Sk| = [( (2𝑖 + 1)𝑘 𝑖=0 ) + ( 2𝑖 − 1𝑘 𝑖=1 )] =1+ [( (2𝑖 + 1)𝑘 𝑖=1 ) + ( 2𝑖 − 1𝑘 𝑖=1 )] = 1+ [ (4𝑖)]𝑘 𝑖=1 =1+ 𝑘 𝑘+1 2 * 4 = 1+ 2k (k+1) = 2k2 + 2k + 1 (12) Now, DCV is calculated for embedding and extracting process by using diamond function f. DCV is calculated as follows f(x, y) = ( (2k + 1) * x + y) mod N (13) {
  • 4. A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding www.iosrjournals.org 28 | Page when f(xʹ, yʹ) = SB then (x, y) is replaced by under flowing or overflowing, (xʹ, yʹ) must be adjusted finely. Thus, four conditions of adjustments are as follows 1. If xʹ > 255, xʹ= xʹ- N 2. If xʹ< 0, xʹ= xʹ+ N 3. If yʹ> 255, yʹ= yʹ- N 4. If yʹ< 0, yʹ= yʹ + N In the diamond encoding method, when neighbourhood values are found, they form a diamond shape. Payload is given by ½ log2 (2k2 + 2k + 1) bpp. So, it is proved that, pixel vector (x, y) does not go beyond the value embedding parameter k even after embedding is completed. It is concluded that maximum data can be embedded in the cover image without degrading the quality of the stego image. V. Quality Analysis and Comparison Whenever any Stego image is created, some new data is embedded in the original/ cover or so called Host image. Because of this embedding, pixel values are modified. To measure the quality of stego image SNR, MSE, etc. are used. So, here, we are dealing SNR of OPAP and DE. SNR is defined as the ratio of signal to noise between cover and stego image. Larger value of SNR denotes better stego image quality. Mathematically, SNR is defined as follows 𝑆𝑁𝑅= 𝑚 −1 𝑥=0 𝑓1 𝑥,𝑦 ]𝑛−1 𝑦=0 2 𝑚 −1 𝑥=0 [𝑓1 𝑥,𝑦 −𝑓(𝑥,𝑦)]2𝑛−1 𝑦=0 Where, f(x, y) = 𝑂𝑟𝑖𝑔𝑖𝑛𝑎𝑙 𝐼𝑚𝑎𝑔𝑒 𝐶𝑜𝑣𝑒𝑟 𝐼𝑚𝑎𝑔𝑒 𝑜𝑟 𝐻𝑜𝑠𝑡 𝐼𝑚𝑎𝑔𝑒 f1(x, y) = 𝑆𝑡𝑒𝑔𝑜 𝐼𝑚𝑎𝑔𝑒 𝑆𝑒𝑐𝑟𝑒𝑡 𝑜𝑟 𝐸𝑚𝑏𝑒𝑑𝑑𝑒𝑑 𝐼𝑚𝑎𝑔𝑒 SNR value in dB given by, SNRdB = 10 log10SNR 1. Analysis of SNR 1.1 LSB Substitution[8] When bit is embedded in ith LSB, SNR is given as: SNRLSB= 6 (4r−1) 1.2 Optimal Pixel Adjustment Process [3] The probability of | P - Pʹʹ|lies in the range of [1, 2rLSB - 1] is 1/2rLSB : SNROPAP = 12 (4rLSB +2) 1.3 Diamond Encoding [7] Digits are embedded in N-ary notional system : SNRDE = 12 1 2N 𝑘−𝑦 𝑥=𝑦−𝑘 𝑘 𝑦=0 (x2 + y2 ) + 𝑘−𝑦 𝑥=𝑦−𝑘 𝑘 𝑦=1 (x2 + y2 ) = 𝑘 𝑘+1 (𝑘²+𝑘+1) 3+6𝑘(𝑘+1) Where, x,y=New pixel pair which uses diamond shape, xi and yi is reference co-ordinates, k=Embedding parameter
  • 5. A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding www.iosrjournals.org 29 | Page Table no.1 SNR of OPAP Sr. No. Cover image Size of cover image (bits) Secret image Size of secret image (bits) SNR with OPAP (db) 1. Baboon 500×500 Lena 250×250 35.406 2. Kelly 500×500 Lena 250×250 33.833 3. Baboon 500×500 Pepper 250×250 35.370 4. Kelly 500×500 Pepper 250×250 33.917 Table no.2 SNR of DE Sr. No. Cover image Size of cover image (bits) Secret image Size of secret image (bits) SNR with DE (db) 1. Baboon 500×500 Lena 250×250 39.479 2. Kelly 500×500 Lena 250×250 38.003 3. Baboon 500×500 Pepper 250×250 39.485 4. Kelly 500×500 Pepper 250×250 37.992 It is clear from TABLE 1 and 2, large amount of data is embedded in cover image without losing imperceptibility of the image. When the size of cover image and secret image is same, SNR is decreased. But when secret image is less than cover image, the average value of SNR for DE according to readings in TABLE 2 is 38.739 whereas for OPAP is 34.631.Therefore we obtain acceptable image quality compared to LSB substitution and EMD. It is also proved that number of bits which can be changed in OPAP is maximum 3and for DE it is 8.Therefore large amount of data is embedded in DE compared to OPAP and EMD. Table no. 3 SNR Comparison of DE with OPAP Sr. No. Cover image Secret image SNR with OPAP (db) SNR with DE (db) SNR improvement of DE over OPAP (db) 1. Baboon Lena 35.406 39.479 4.073 2. Kelly Lena 33.833 38.003 4.170 3. Baboon Pepper 35.370 39.485 4.115 4. Kelly Pepper 33.917 37.992 4.075 TABLE 3, indicates SNR comparison of OPAP and DE and SNR improvement of DE over OPAP. From this comparison it is clear that DE outperforms EMD and OPAP outperforms LSB substitution in terms of embedding efficiency, quality of stego image, etc. Fig. 1and Fig. 2 show the cover image Baboon and secret image of Lena and Pepper using OPAP and DE respectively.
  • 6. A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding www.iosrjournals.org 30 | Page i] ii] iii] i] ii] iii] Fig. 1. i] Cover image ii] Secret image and iii] Stego image by OPAP i] ii] iii] i] ii] iii] Fig. 2. i] Cover image ii] Secret image and iii] Stego image by DE From Fig.1 & 2 it is proved that DE gives better result compared to OPAP in terms of image quality. V. Conclusion This paper implements two efficient data embedding techniques. Optimal Pixel Adjustment Process gives acceptable image quality as compared to Least Significant Bit substitution method whereas Diamond Encoding enhances SNR.SNR improvement shown in TABLE 3 concludes DE outperforms OPAP as pixel improvement is of minimum 4db. When an image having large areas with same color shades are used as cover image, change in pixel can be easily detected in OPAP. Clearly, the embedding parameter k which is derived by N-ary notational system in DE allows bit replacement up to 8 bits which is limited in OPAP. DE gives no artifacts in stego image for specific value of k, and large amount of data can be embedded in cover image maintaining stego image quality or imperceptibility of an image. DE gives comparatively a better performance with respect to EMD, LSB substitution and OPAP. However with increasing values of k, pixel pair matching in an adaptive manner can be considered as an alternate approach.
  • 7. A novel image hiding scheme by Optimal Pixel Pair Matching and Diamond Encoding www.iosrjournals.org 31 | Page References [1] J. Fridrich, M. Golijan, and R. Du, “Reliable detection of LSB steganography in color and grayscale images,” in Proc. Int. Workshop on Multimedia and Security, 2001, pp. 27-30 [2] A. D. Ker, “Steganalysis of LSB matching in grayscale images” IEEE Signal Process. Lett. vol. 12, no. 6, pp. 441-444, Jun. 2005 [3] Ran-Zan Wang, Chi-Fang Lin, Ja-Chen Lin, “Image hiding by optimal LSB substitution and genetic algorithm,” Pattern Recognition, vol.34, no. 3, 671683, 2001 [4] C. H. Yang, “Inverted pattern approach to improve image quality of information hiding by LSB substitution,” PatternRecognit. vol. 41, no.8, pp. 2674-2683, 2008 [5] J. Mielikainen, “LSB Matching revisited,” IEEE Signal Process. Lett. vol.13, no. 5, pp. 285-287, May 2006. [6] J. Wang, Y Sun, H. Xu, K. Chen, H. J. Kim, and S. H. Joo, “An improved section wise exploiting modification direction method,” Signal Process., vol. 90, no. 11, pp. 2954-2964, 2010. [7] Xinpeng Zhang and Shuozhong Wang, “Efficient Steganographic embedding by exploiting modification direction,” IEEE Communication Lett. Vol. 10, no.11, Nov. 2006 [8] Chi- Kwong Chan, L.M. Cheng, “Improved hiding data in images in optimal moderately significant bit replacement,” IEE electron. Lett. 37, vol. 16, pp. 1017-1018, 2001.