SlideShare uma empresa Scribd logo
1 de 24
An Adaptive LSB-OPAP based Secret
Data Hiding
by
TEJAS.S
under the guidance of
Prof. PADMAJA VIJAYKUMAR
ECE Dept. AIeMS
Introduction
Ways of sending information
encryption steganograhy
Steganography !
encrypt msg cover file
watermarking
Advantages
secrecy
Imperceptibility
High capacity
Accurate extraction
files such as audio,video,image,etc..
Image Steganography
process
Classical Methods
 Kirchoff’s golden rule
 Adaptive Steganography
 4LSB substitution technique
 Model authentication technique
Objective of proposed method
 Enhance embedding capacity of image .
 An adaptive number of least significant bits
substitution method with private stego-key.
 verify whether the attacker has tried to
modify the secret hidden information in the
stego-image.
 embed the hidden information in the cover
image and use digital signature using a key
to verify the integrity from the stego-image.
Method
 key1 consists of some gray-level ranges.
 Each range substitute different fixed number of
bits into LS part of the 8-bit gray value of the
pixels.
 Pixel gray value “g” that fall within the range Ai-
Bi is changed by embedding message bits of
secret information into new gray value “g’ ”.
 OPAP is used that make the new gray value “g’
” fall within the range Ai-Bi.
 Digital signature of the secret information with
the key2 were obtained and appended with the
information
Private stego-key
generation
 For a gray scale image 8-bit is used
to represent intensity of pixel, so there
are only 256 different gray values any
pixel may hold.
 Different pixels in image may hold
different gray values
 let four ranges of gray levels are < A1-
B1, A2-B2, A3-B3, A4-B4 > each
range starting and ending value are in
8-bits.
Method to decide Bits
insertion in each range
 Let the four gray ranges decided by
the stego-key are <A1-B1, A2-B2, A3-
B3, A4-B4>
 number of pixel count from cover
image in each range are < N1, N2,
N3, N4 >.
 Let the ranges be 0-64, 65-127, 128-
191, 192-255
 Let ranges hold no of pixels 34,
13238, 17116, 35148.
LSB substitution
OPAP – Optimum Pixel Adjustment
Process
K = K+1
Example :
consider a gray level range 0-32, 3 – bits
substitution are 111
 1 : let 00100000 (32) be pixel value of g,
 2 : after LSB method, g’ = 001000111 (39)
 3 : g’ < 32, K+1 bit of g’ changed from 0 to
1 or via- versa (00101111) and checked
again to fall within range if not K+2 bit is
changed (00111111) and so on until gray
value fall within range 00011111(31).
IMPLEMENTATION OF ALOS
 ENCODING ALGORITHM
 Input: Cover-image, secret message, keys K1, K2.
 Output: Stego-image.
 Step1: Read key K1 based on gray-Level ranges.
 Step2: Read cover image
 Step3: Decide No. of bits insertion into each range described in
section 2.3
 Step4: Read the secret message and Convert it into bit stream form.
 Step5: Read the key K2.
 Step6: Find the signature using K2 and append with the message
bits.
 Step7: For each Pixel
 7.1: Find gray value g.
 7.2: Decide the K-bits insertion based on gray ranges.
 7.3: Find K-message bits and insert using method given in section
2.4
 7.4: Decide and adjust new gray Value g’ using method described in
Optimum pixel adjustment process.
EXTRACTION ALORITHM
 Input: Stego-image, keys K1, K2;
 Output: Secret information;
 Step1: Read key K1 based on gray-level ranges.
 Step2: Read the stego image.
 Step3: Decide No. of bits extraction into each range
described in section 2.3.
 Step4: For each pixel, extract the K-bits and save into
file.
 Step5: Read the key K2 and find the signature of bit
stream
 Step6: Match the signature.
 Step7: End
Advantages :
 High hiding capacity compared to LSB Substitution
technique.
 Robust in nature, i.e., highly secure algorithm since two
keys (key-1 and key-2) are used.
 We get good quality of the stego image.
 High water marking level.
 Provides maximum possible payload.
 Embedded data is imperceptible to the observer.
Limitations :
 High computational complexity.
 Requires a lot of overhead to hide a relatively bits of
information.
This can be overcome by using HIGH SPEED
Applications
 In secret communication system.
 Military applications.
 Hiding and protecting of secret data in
industry.
 Navy and Air force.
 Business Deals
Results and Discussions
 Lena and baboon 256 × 256 × 3 colour digital images
Range Cover image
Max bits that can
be embedded
(payload)
No of bits
embedded
Capacity
(bits/pixel
)
PSNR
Range1
Lena 653149
51360 3.8016 44.9412
4768 3.141 55.5705
115360 3.2268 40.8688
Baboon 609524
51360 3.2927 44.7668
4768 3.2 54.8287
115360 3.0352 41.7503
Range2
Lena 693700
51360 3.624 43.494
4768 3.7338 53.4812
115360 3.6078 40.3313
Baboon 700087
51360 3.6488 43.2479
4768 3.7192 53.6941
115360 3.5019 40.2084
The input cover image
0
200
400
600
The histogram of input cover image
0 100 200
The output stego image
0
200
400
600
800
The histogram of stego image
0 100 200
Experimental result using Range1 for Baboon cover image
The input cover image
0
200
400
600
800
The histogram of input cover image
0 100 200
The output stego image
0
500
1000
The histogram of stego image
0 100 200
Experimental result using Range2 for Lena cover image
Conclusion
 Enhanced embedding capacity of image .
 An adaptive number of least significant bits substitution
method with private stego-key.
 whether the attacker has tried to modify the secret
hidden information in the stego-image.
 embeded the hidden information in the cover image and
use digital signature using a key to verify the integrity
from the stego-image.
 Experimental results verify that the proposed model is
effective and efficient.
References
 S. Dumitrescu, W. X. Wu and N. Memon, “On steganalysis of
random LSB embedding in continuous-tone images”,
Proceeding of International conference on image Processing,
Rochester, NY, pp. 641-644, 2002.
 A. Cheddad, J. Condell, K. Curran and P. McKevitt,
“Enhancing Steganography in digital images”, IEEE - 2008
Canadian conference on computer and Robot vision, pp. 326-
332,2008.
 Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, and Te-
ming Tu, “A novel image steganographic method using Tri-
way pixel value Differencing”, Journal of multimedia, vol. 3,
issue 2, June 2008.
 K. S. Babu, K. B. Raja, K. Kiran Kumar, T. H. Manjula Devi, K.
R. Venugopal, L. M.Pataki, “Authentication of secret
information in image steganography”, IEEE Region 10
Conference, TENCON-2008, pp. 1-6, Nov. 2008.
 S. K. Moon and R.S. Kawitkar, “Data Security using Data
Hiding”, IEEE International conference on computational
intelligence and multimedia applications, vol. 4, pp. 247251,
Dec 2007
THANK YOU

Mais conteúdo relacionado

Mais procurados

Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis zaidsalfawzan
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarkingSaurabh Kaushik
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganographyARYA TM
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganographyKamonasish Hore
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarkingsudip nandi
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptographyAvinash Mishra
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 
Presentation i
Presentation iPresentation i
Presentation inidhip216
 

Mais procurados (20)

Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography
SteganographySteganography
Steganography
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Steganography and Steganalysis
Steganography and Steganalysis Steganography and Steganalysis
Steganography and Steganalysis
 
Steganography
SteganographySteganography
Steganography
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 
Steganography
Steganography Steganography
Steganography
 
steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
Multi-Level audio steganography
Multi-Level audio steganographyMulti-Level audio steganography
Multi-Level audio steganography
 
Video Steganography
Video SteganographyVideo Steganography
Video Steganography
 
SEMINAR ON staganography
SEMINAR ON staganographySEMINAR ON staganography
SEMINAR ON staganography
 
Steganography and watermarking
Steganography and watermarkingSteganography and watermarking
Steganography and watermarking
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Image steganography and cryptography
Image steganography and cryptographyImage steganography and cryptography
Image steganography and cryptography
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 
Presentation i
Presentation iPresentation i
Presentation i
 

Destaque

Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Guillaume Gales
 
A novel data embedding method using adaptive pixel
A novel data embedding method using adaptive pixelA novel data embedding method using adaptive pixel
A novel data embedding method using adaptive pixelRenuka Verma
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewEditor IJMTER
 
Image proceesing with matlab
Image proceesing with matlabImage proceesing with matlab
Image proceesing with matlabAshutosh Shahi
 
Basics of Image Processing using MATLAB
Basics of Image Processing using MATLABBasics of Image Processing using MATLAB
Basics of Image Processing using MATLABvkn13
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing pptashwini.jagdhane
 
Introduction to digital image processing
Introduction to digital image processingIntroduction to digital image processing
Introduction to digital image processingHossain Md Shakhawat
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarkingAnkush Kr
 

Destaque (16)

Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)
 
Stegnography
StegnographyStegnography
Stegnography
 
Stegnography
StegnographyStegnography
Stegnography
 
A novel data embedding method using adaptive pixel
A novel data embedding method using adaptive pixelA novel data embedding method using adaptive pixel
A novel data embedding method using adaptive pixel
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Reversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A ReviewReversible Data Hiding in Encrypted Image: A Review
Reversible Data Hiding in Encrypted Image: A Review
 
Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image proceesing with matlab
Image proceesing with matlabImage proceesing with matlab
Image proceesing with matlab
 
Basics of Image Processing using MATLAB
Basics of Image Processing using MATLABBasics of Image Processing using MATLAB
Basics of Image Processing using MATLAB
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Real time image processing ppt
Real time image processing pptReal time image processing ppt
Real time image processing ppt
 
Introduction to digital image processing
Introduction to digital image processingIntroduction to digital image processing
Introduction to digital image processing
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Image processing ppt
Image processing pptImage processing ppt
Image processing ppt
 

Semelhante a Technical seminar ppt

Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
A novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingA novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingTELKOMNIKA JOURNAL
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...IOSR Journals
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 

Semelhante a Technical seminar ppt (20)

Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
A novel method for digital data encoding-decoding
A novel method for digital data encoding-decodingA novel method for digital data encoding-decoding
A novel method for digital data encoding-decoding
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...High Security Cryptographic Technique Using Steganography and Chaotic Image E...
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
C010511420
C010511420C010511420
C010511420
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 

Technical seminar ppt

  • 1. An Adaptive LSB-OPAP based Secret Data Hiding by TEJAS.S under the guidance of Prof. PADMAJA VIJAYKUMAR ECE Dept. AIeMS
  • 2. Introduction Ways of sending information encryption steganograhy
  • 3. Steganography ! encrypt msg cover file watermarking Advantages secrecy Imperceptibility High capacity Accurate extraction files such as audio,video,image,etc..
  • 5. Classical Methods  Kirchoff’s golden rule  Adaptive Steganography  4LSB substitution technique  Model authentication technique
  • 6. Objective of proposed method  Enhance embedding capacity of image .  An adaptive number of least significant bits substitution method with private stego-key.  verify whether the attacker has tried to modify the secret hidden information in the stego-image.  embed the hidden information in the cover image and use digital signature using a key to verify the integrity from the stego-image.
  • 7. Method  key1 consists of some gray-level ranges.  Each range substitute different fixed number of bits into LS part of the 8-bit gray value of the pixels.  Pixel gray value “g” that fall within the range Ai- Bi is changed by embedding message bits of secret information into new gray value “g’ ”.  OPAP is used that make the new gray value “g’ ” fall within the range Ai-Bi.  Digital signature of the secret information with the key2 were obtained and appended with the information
  • 8. Private stego-key generation  For a gray scale image 8-bit is used to represent intensity of pixel, so there are only 256 different gray values any pixel may hold.  Different pixels in image may hold different gray values  let four ranges of gray levels are < A1- B1, A2-B2, A3-B3, A4-B4 > each range starting and ending value are in 8-bits.
  • 9. Method to decide Bits insertion in each range  Let the four gray ranges decided by the stego-key are <A1-B1, A2-B2, A3- B3, A4-B4>  number of pixel count from cover image in each range are < N1, N2, N3, N4 >.  Let the ranges be 0-64, 65-127, 128- 191, 192-255  Let ranges hold no of pixels 34, 13238, 17116, 35148.
  • 11. OPAP – Optimum Pixel Adjustment Process K = K+1
  • 12. Example : consider a gray level range 0-32, 3 – bits substitution are 111  1 : let 00100000 (32) be pixel value of g,  2 : after LSB method, g’ = 001000111 (39)  3 : g’ < 32, K+1 bit of g’ changed from 0 to 1 or via- versa (00101111) and checked again to fall within range if not K+2 bit is changed (00111111) and so on until gray value fall within range 00011111(31).
  • 13. IMPLEMENTATION OF ALOS  ENCODING ALGORITHM  Input: Cover-image, secret message, keys K1, K2.  Output: Stego-image.  Step1: Read key K1 based on gray-Level ranges.  Step2: Read cover image  Step3: Decide No. of bits insertion into each range described in section 2.3  Step4: Read the secret message and Convert it into bit stream form.  Step5: Read the key K2.  Step6: Find the signature using K2 and append with the message bits.  Step7: For each Pixel  7.1: Find gray value g.  7.2: Decide the K-bits insertion based on gray ranges.  7.3: Find K-message bits and insert using method given in section 2.4  7.4: Decide and adjust new gray Value g’ using method described in Optimum pixel adjustment process.
  • 14.
  • 15. EXTRACTION ALORITHM  Input: Stego-image, keys K1, K2;  Output: Secret information;  Step1: Read key K1 based on gray-level ranges.  Step2: Read the stego image.  Step3: Decide No. of bits extraction into each range described in section 2.3.  Step4: For each pixel, extract the K-bits and save into file.  Step5: Read the key K2 and find the signature of bit stream  Step6: Match the signature.  Step7: End
  • 16.
  • 17. Advantages :  High hiding capacity compared to LSB Substitution technique.  Robust in nature, i.e., highly secure algorithm since two keys (key-1 and key-2) are used.  We get good quality of the stego image.  High water marking level.  Provides maximum possible payload.  Embedded data is imperceptible to the observer. Limitations :  High computational complexity.  Requires a lot of overhead to hide a relatively bits of information. This can be overcome by using HIGH SPEED
  • 18. Applications  In secret communication system.  Military applications.  Hiding and protecting of secret data in industry.  Navy and Air force.  Business Deals
  • 19. Results and Discussions  Lena and baboon 256 × 256 × 3 colour digital images Range Cover image Max bits that can be embedded (payload) No of bits embedded Capacity (bits/pixel ) PSNR Range1 Lena 653149 51360 3.8016 44.9412 4768 3.141 55.5705 115360 3.2268 40.8688 Baboon 609524 51360 3.2927 44.7668 4768 3.2 54.8287 115360 3.0352 41.7503 Range2 Lena 693700 51360 3.624 43.494 4768 3.7338 53.4812 115360 3.6078 40.3313 Baboon 700087 51360 3.6488 43.2479 4768 3.7192 53.6941 115360 3.5019 40.2084
  • 20. The input cover image 0 200 400 600 The histogram of input cover image 0 100 200 The output stego image 0 200 400 600 800 The histogram of stego image 0 100 200 Experimental result using Range1 for Baboon cover image
  • 21. The input cover image 0 200 400 600 800 The histogram of input cover image 0 100 200 The output stego image 0 500 1000 The histogram of stego image 0 100 200 Experimental result using Range2 for Lena cover image
  • 22. Conclusion  Enhanced embedding capacity of image .  An adaptive number of least significant bits substitution method with private stego-key.  whether the attacker has tried to modify the secret hidden information in the stego-image.  embeded the hidden information in the cover image and use digital signature using a key to verify the integrity from the stego-image.  Experimental results verify that the proposed model is effective and efficient.
  • 23. References  S. Dumitrescu, W. X. Wu and N. Memon, “On steganalysis of random LSB embedding in continuous-tone images”, Proceeding of International conference on image Processing, Rochester, NY, pp. 641-644, 2002.  A. Cheddad, J. Condell, K. Curran and P. McKevitt, “Enhancing Steganography in digital images”, IEEE - 2008 Canadian conference on computer and Robot vision, pp. 326- 332,2008.  Ko-Chin Chang, Chien-Ping Chang, Ping S. Huang, and Te- ming Tu, “A novel image steganographic method using Tri- way pixel value Differencing”, Journal of multimedia, vol. 3, issue 2, June 2008.  K. S. Babu, K. B. Raja, K. Kiran Kumar, T. H. Manjula Devi, K. R. Venugopal, L. M.Pataki, “Authentication of secret information in image steganography”, IEEE Region 10 Conference, TENCON-2008, pp. 1-6, Nov. 2008.  S. K. Moon and R.S. Kawitkar, “Data Security using Data Hiding”, IEEE International conference on computational intelligence and multimedia applications, vol. 4, pp. 247251, Dec 2007