SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. IV (July – Aug. 2015), PP 46-51
www.iosrjournals.org
DOI: 10.9790/0661-17444651 www.iosrjournals.org 46 | Page
Data Hiding Inside the Image Using Uniform Embedding
Techniques
J. S. Harini, Student1
,
1
(Computer Science and Engineering, Sitams College / JNTUA, INDIA)
I. Introduction
The main aim of steganography is to hide data in the text media such as image, text, audio and video so
that it cannot be identified by others. One of the advantages of steganography is that it can be used to transmit
the secret messages without knowing the fact of transmission being discovered.
In existing there are three effective methods applied to image steganography are
1. Least Significant Bit (LSB) substitution
2. Blocking
3. Palette Modification.
The process of checking the bit of pixels into carrier image is known as LSB substitution.LSB is the
most powerful steganographic method which lends itself.
To maintain the confidentiality and integrity of data to prevent them from unauthorized persons.
Transmitting the military data and data related to economic, industrial organization towards the information
pertaining the institutions of finance and business must be confidential for transferring of data. As a result there
is a need of information hiding which explains the general methods and techniques used in the area of security
and confidentiality of information security for transferring them from one end to other this is one kind of
problem emerged by the various means of communication.
Encryption is the most important method used for transferring confidential data from one format to
another format using certain was by the sender and the recipient restores it to the original form. The term
steganography was derived from Greek terminology. The term stegano means hiding or restricting and the term
graphy means text, drawing or writing. This method was existing from the Greeks age which was later
developed on the advancement of communication. With the advancement of communication security has
become an important issue. Steganography is used to hide the secret data inside other objects such as text
images audio and video to protect the confidential data. After hiding the image it should be seen as singular
object and as well as materialistic. The intruder will feel difficult to discover the stego object upon its
transferring among the internet until it reaches extraction of secret data.
Problem Definition:
The art and science of hiding information by embedding messages with in other terminology harmless
messages. Steganography works by replacing bits of useless or unused data in regular computer file (such as
graphics, format, text, and html) with bits of different invisible information. There is a need for an algorithm to
embed the message. This algorithm uses simple or complex LSB embedding in the spatial domain. The hiding
process starts with embedding bits of the message in to the image. In LSB insertion technique we use the least
significant bit to embed the message. To improve the embedding capacity, two or more bits in a pixel are used
to embed messages by changing the LSB of pixel in a sequential order.
The techniques that are available today are invisible to a human senses and most of it takes a gray color
images as a special case. In order to embed a text message using a color image as a cover, two or more aspects
must be considered:
1. Choose the pixel to embed.
2. Using a randomization technique by changing the LSB pixels to embed messages.
Objectives:
The main objectives are:
1. To select the pixel for an embedding a new technique is developed and designed.
2. Reduce the size for embedding the text.
3. To resist extraction process a high degree of confidentiality is given.
Data Hiding Inside the Image Using Uniform Embedding Techniques
DOI: 10.9790/0661-17444651 www.iosrjournals.org 47 | Page
Significance of the problem:
A special kind of problem is categorized through the digital image steganography problem, till now,
there is no proper technique used to solve this problem, but many suggested algorithms give us good results.
The LSB of the pixels in a BMP image mainly focuses on hiding the text message.
In order to get some results about its ability to make the message store in a random way the study will
mainly focus on choosing a pixel to embed a part of the text message under a conditional value.
Since ancient times the term steganography exists and many of general assumptions apply till now. In
the area of invisible digital watermarking motivated by the desire for copyright protection of multimedia
through internet is the most of recent work undergone through steganography.
To signify origin or ownership of the digital cover signal within a signature embedded is the objective
of the digital watermarking. To embed a amount of data signified more than that of a serial number or signature
within the cover signal is the objective of steganography.
II. Literature Survey
1. Minimizing additive distortion in steganography using syndrome-trellis codes
This paper proposes a complete practical methodology for minimizing additive distortion in
steganography with general (nonbinary) embedding operation. Let every possible value of every stego element
be assigned a scalar expressing the distortion of an embedding change done by replacing the cover element by
this value. The total distortion is assumed to be a sum of per-element distortions. Both the payload-limited
sender (minimizing the total distortion while embedding a fixed payload) and the distortion-limited sender
(maximizing the payload while introducing a fixed total distortion) are considered. Without any loss of
performance, the nonbinary case is decomposed into several binary cases by replacing individual bits in cover
elements. The binary case is approached using a novel syndrome-coding scheme based on dual convolution
codes equipped with the Viterbi algorithm. This fast and very versatile solution achieves state-of-the-art results
in steganographic applications while having linear time and space complexity the number of covers elements.
We report extensive experimental results for a large set of relative payloads and for different distortion profiles,
including the wet paper channel. Practical merit of this approach is validated by constructing and testing
adaptive embedding schemes for digital images in raster and transform domains. Most current coding schemes
used in steganography (matrix embedding, wet paper codes, etc.) and many new ones can be implemented using
this framework.
2. Modified matrix encoding technique for minimal distortion steganography
It is well known that all information hiding methods that modify the least significant bits introduce
distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that
the objects had been modified. It has been proposed that only coefficients whose modification does not
introduce large distortions should be used for embedding. In this paper we propose an efficient algorithm for
information hiding in the LSBs of JPEG coefficients. Our algorithm uses modified matrix encoding to choose
the coefficients whose modifications introduce minimal embedding distortion. We derive the expected value of
the embedding distortion as a function of the message length and the probability distribution of the JPEG
quantization errors of cover images. Our experiments show close agreement between the theoretical prediction
and the actual embedding distortion. Our algorithm can be used for both steganography and fragile
watermarking as well as in other applications in which it is necessary to keep the distortion as low as possible.
3. Design of adaptive steganographic schemes for digital image
Most steganographic schemes for real digital media embed messages by minimizing a suitably defined
distortion function. In practice, this is often realized by syndrome codes which offer near-optimal rate-distortion
performance. However, the distortion functions are designed heuristically and the resulting steganographic
algorithms are thus suboptimal. In this paper, we present a practical framework for optimizing the parameters of
additive distortion functions to minimize statistical detectability. We apply the framework to digital images in
both spatial and DCT domain by first defining a rich parametric model which assigns a cost of making a change
at every cover element based on its neighbourhood. Then, we present a practical method for optimizing the
parameters with respect to a chosen detection metric and feature space. We show that the size of the margin
between support vectors in soft-margin SVMs leads to a fast detection metric and that methods minimizing the
margin tend to be more secure blind steganalysis. The parameters obtained by the Nelder--Mead simplex-
reflection algorithm for spatial and DCT-domain images are presented and the new embedding methods are
tested by blind steganalyzers utilizing various feature sets. Experimental results show that as few as 80 images
are sufficient for obtaining good candidates for parameters of the cost model, which allows us to speed up the
parameter search.
Data Hiding Inside the Image Using Uniform Embedding Techniques
DOI: 10.9790/0661-17444651 www.iosrjournals.org 48 | Page
4. Digital image steganography using universal distortion
Currently, the most secure practical steganographic schemes for empirical cover sources embed their
payload while minimizing a distortion function designed to capture statistical detectability. Since there exists a
general framework for this embedding paradigm with established payload-distortion bounds as well as near-
optimal practical coding schemes, building an embedding scheme has been essentially reduced to the distortion
design. This is not an easy task as relating distortion to statistical detectability is a hard and open problem. In
this article, we propose an innovative idea to measure the embedding distortion in one fixed domain
independently of the domain where the embedding changes (and coding) are carried out. The proposed universal
distortion is additive and evaluates the cost of changing an image element (e.g., pixel or DCT coefficient) from
directional residuals obtained using a Daubechies wavelet filter bank. The intuition is to limit the embedding
changes only to those parts of the cover that are difficult to model in multiple directions while avoiding smooth
regions and clean edges. The utility of the universal distortion is demonstrated by constructing steganographic
schemes in the spatial; JPEG, and side-informed JPEG domains, and comparing their security to current state-
of-the-art methods using classifiers trained with rich media models.
5. Reversible Data Embedding Using a Difference Expansion
In this paper, we present a novel reversible data embedding method for digital images. We explore the
redundancy in digital images to achieve very high embedding capacity, and keep the distortion low.
6. On Compressing Encrypted Data
In this paper, we investigate the novelty of reversing the order of these steps, i.e., first encrypting and
then compressing, without compromising either the compression efficiency or the information-theoretic
security. Although counter-intuitive, we show surprisingly that, through the use of coding with side information
principles, this reversal of order is indeed possible in some settings of interest without loss of either optimal
coding efficiency or perfect secrecy.
III. Indentations and Equations
Steganography Terminology
Steganography system is divided into two operations as detailed below:
1- Embedding process: from which it can choose the cover then put secret messages included using the stego
key that contains the secret message Stego Cover.
2- Extraction process: From which to extract the secret message using the secret key, and can be watched
through the lid are moving between the sender and the recipient by the attackers who have no right to extract the
secret message.
System Architecture
Data Hiding Inside the Image Using Uniform Embedding Techniques
DOI: 10.9790/0661-17444651 www.iosrjournals.org 49 | Page
Reversible Data Hiding:
Reversible Data hiding Images is a technique, by which the original cover can be loss lessly recovered
after the embedded message is extracted. In theoretical aspect, Kalker and Willems established a rate-distortion
model for RDH, through which they proved the rate-distortion bounds of RDH for memory less covers and
proposed a recursive code construction which, however, does not approach the bound. Improved the recursive
code construction for binary covers and proved that this construction can achieve the rate-distortion bound as
long as the compression algorithm reaches entropy, which establishes the equivalence between data
compression and RDH for binary covers.
Images encryption is an effective and popular means as it converts the original and meaningful content
to incomprehensible one. Although few RDH techniques in encrypted images have been published yet, there are
some promising applications if RDH can be applied to encrypted images. In advocated a reputation-based trust
management scheme enhanced with data coloring (a way of embedding data into covers) and software
watermarking, in which data encryption and coloring offer possibilities for upholding the content owner’s
privacy and data integrity. Obviously, the cloud service provider has no right to introduce permanent distortion
during data coloring into encrypted data. Thus, a reversible data coloring technique based on encrypted data is
preferred. Suppose a medical image database is stored in a data center, and a server in the data center can embed
notations into an encrypted version of a medical image through a RDH technique. With the notations, the server
can manage the image or verify its integrity without having the knowledge of the original content, and thus the
patient’s privacy is protected. On the other hand, a doctor, having the cryptographic key, can decrypt and restore
the image in a reversible manner for the purpose of further diagnosing.
Extracting Data from Encrypted Images:
To manage and update personal information of images which are encrypted for protecting clients’
privacy, an inferior database manager may only get access to the data hiding key and have to manipulate data in
encrypted domain. The order of data extraction before image decryption guarantees the feasibility of our work in
this case. When the database manager gets the data hiding key, he can decrypt the LSB-planes of and extract the
additional data by directly reading the decrypted version. When requesting for updating information of
encrypted images, the database manager, then, updates information through LSB replacement and encrypts
updated information according to the data hiding key all over again. As the whole process is entirely operated on
encrypted domain, it avoids the leakage of original content.
Extracting Data from Decrypted Images:
In Case, both embedding and extraction of the data are manipulated in encrypted domain. On the other
hand, there is a different situation that the user wants to decrypt the image first and extracts the data from the
decrypted image when it is needed. The following example is an application for such scenario. Assume Alice
outsourced her images to a cloud server, and the images are encrypted to protect their contents. Into the
encrypted images, the cloud server marks the images by embedding some notation, including the identity of the
images’ owner, the identity of the cloud server and time stamps, to manage the encrypted images. Note that the
cloud server has no right to do any permanent damage to the images. Now an authorized user, Bob who has
been shared the encryption key and the data hiding key, downloaded and decrypted the images. Bob hoped to
get marked decrypted images, i.e., decrypted images still including the notation, which can be used to trace the
source and history of the data. The order of image decryption before/without data extraction is perfectly suitable
for this case. Next, we describe how to generate a marked decrypted image.
Image Partition:
The operator here for reserving room before encryption is a standard RDH technique, so the goal of
image partition is to construct a smoother area , on which standard RDH algorithms such as can achieve better
performance. To do that, without loss of generality, assume the original image is an 8 bits gray-scale image with
its size and pixels.
Image Encryption:
After rearranged self-embedded image, denoted by , is generated, we can encrypts to construct the
encrypted image, denoted by .With a stream cipher, the encryption version of is easily obtained. For example, a
gray value ranging from 0 to 255 can be represented by 8 bits, , such that The encrypted bits can be calculated
through exclusive- or operation where is generated via a standard stream cipher determined by the encryption
key. Finally, we embed 10 bits information into LSBs of first 10 pixels in encrypted version of to tell data hider
the number of rows and the number of bit-planes he can embed information into. Note that after image
encryption, the data hider or a third party cannot access the content of original image without the encryption
key, thus privacy of the content owner being protected.
Data Hiding Inside the Image Using Uniform Embedding Techniques
DOI: 10.9790/0661-17444651 www.iosrjournals.org 50 | Page
Data Hiding in Encrypted Image:
Once the data hider acquires the encrypted image, he can embed some data into it, although he does not
get access to the original image. The embedding process starts with locating the encrypted version of , denoted
by . Since has been rearranged to the top of , it is effortless for the data hider to read 10 bits information in LSBs
of first 10 encrypted pixels. After knowing how many bit-planes and rows of pixels he can modify, the data
hider simply adopts LSB replacement to substitute the available bit-planes with additional data. Finally, the data
hider sets a label following to point out the end position of embedding process and further encrypts according to
the data hiding key to formulate marked encrypted image denoted by. Anyone who does not possess the data
hiding key could not extract the additional data.
LSB: least significant bits
The least significant bits have the useful property of changing rapidly if the number changes even
slightly. For example, if 1 (binary 00000001) is added to 3 (binary 00000011), the result will be 4 (binary
00000100) and three of the least significant bits will change (011 to 100). By contrast, the three most significant
bits stay unchanged (000 to 000).
Least significant bits are frequently employed in pseudorandom number generators, hash functions and
checksums. LSB, in all capitals, can also stand for “Least Significant Byte”. The meaning is parallel to the
above: it is the byte (or octet) in that position of a multi-byte number which has the least potential value in
Steganography a message might be hidden or encrypt with in in an image by changing least significant bit to be
the message bits then the image can be transmitted through network.lsb based Steganography is perhaps the
most simple and straight forward approach . in this will only affect each pixel by +-1, if at all ,it is generally
assumed with good reason that degradation caused by this embedding process would perceptually transparent.
hence there are number of lsb based Steganography techniques in the passive warden model as it difficult to
differentiate cover-image from stego images ,given the small changes that have been made.
There are many methods for steganography ,to hide the secret message into the image.LSB is the well
known method for data hiding. The approaches for steganography that are based on LSB can be found .The
another is PVD Method i.e. pixel-value differencing method divides the cover image into blocks and modifies
the pixel difference in each block for data embedding. Gray-level modification Steganography is a technique to
map data by modifying the gray level values of the image pixels. It uses the odd and even numbers to map data
within an image.
A Novel Steganographic Technique for Hiding Text behind Image
There are two major steps. First one is embedding the secret message in cover media using stegokey
the second one is extracting the secret message from the cover media using stegokey.For extraction the secret
message from the stego-media the recipient must have the stego-key.
Color histogram Techniques
In image processing and photography, a color histogram is a representation of the distribution of colors
in an image. For digital images, a color histogram represents the number of pixels that have colors in each of a
fixed list of color ranges, that span the image's colour, the set of all possible colors. The color histogram can be
built for any kind of color space, although the term is more often used for three-dimensional spaces
like RGB or HSV. For monochromatic images, the term intensity histogram may be used instead. For multi-
spectral images, where each pixel is represented by an arbitrary number of measurements (for example, beyond
the three measurements in RGB), the color histogram is N-dimensional, with N being the number of
Data Hiding Inside the Image Using Uniform Embedding Techniques
DOI: 10.9790/0661-17444651 www.iosrjournals.org 51 | Page
measurements taken. Each measurement has its own wavelength range of the light spectrum, some of which
may be outside the visible spectrum. If the set of possible color values is sufficiently small, each of those colors
may be placed on a range by itself; then the histogram is merely the count of pixels that have each possible
color. Most often, the space is divided into an appropriate number of ranges, often arranged as a regular grid,
each containing many similar color values. The color histogram may also be represented and displayed as a
smooth function defined over the color space that approximates the pixel counts.
IV. Conclusion
The effectiveness of the proposed scheme is verified with evidence obtained from exhaustive
experiments using popular steganalyzers with various feature sets on the BOSSbase database. Compared with
prior arts, the proposed scheme gains favourable performance in terms of secure embedding capacity against
steganalysis.
Acknowledgements
The authors would like to thank the anonymous reviewers and associate editor for their comments that
greatly improved the manuscript.
I express my heartful thanks to my project guide Dr. P. NEELAKANTAN, for his guidance and
support at each and every stage of the project.
References
Theses
[1]. (Piyush Goel),Data Hiding in Digital Images: A Steganographic Paradigm
[2]. (Dr. Oleg Victorov), Enhancement of A Steganographic algorithm for Hiding Text Messages in Images
Websites
WWW.google.com
[3]. T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion insteganography using syndrome-trellis codes,” IEEE Trans. Inf.
ForensicsSecurity, vol. 6, no. 3, pp. 920–935, Sep. 2011.(Ref no.1.)

Mais conteúdo relacionado

Mais procurados

Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganographysipij
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...IJECEIAES
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyIOSR Journals
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...CSCJournals
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd Iaetsd
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Dr. Amarjeet Singh
 
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...IJECEIAES
 

Mais procurados (18)

F045033440
F045033440F045033440
F045033440
 
Conditional entrench spatial domain steganography
Conditional entrench spatial domain steganographyConditional entrench spatial domain steganography
Conditional entrench spatial domain steganography
 
D010312230
D010312230D010312230
D010312230
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Ja2415771582
Ja2415771582Ja2415771582
Ja2415771582
 
Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...Security and imperceptibility improving of image steganography using pixel al...
Security and imperceptibility improving of image steganography using pixel al...
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
 
A Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image SteganographyA Review of Comparison Techniques of Image Steganography
A Review of Comparison Techniques of Image Steganography
 
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
Comparative Performance of Image Scrambling in Transform Domain using Sinusoi...
 
Iaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwtIaetsd design of image steganography using haar dwt
Iaetsd design of image steganography using haar dwt
 
G0210032039
G0210032039G0210032039
G0210032039
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
Ijritcc 1378
Ijritcc 1378Ijritcc 1378
Ijritcc 1378
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
 
Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...Technical analysis of content placement algorithms for content delivery netwo...
Technical analysis of content placement algorithms for content delivery netwo...
 
Ab4506151155
Ab4506151155Ab4506151155
Ab4506151155
 

Destaque (20)

H010325563
H010325563H010325563
H010325563
 
I012625461
I012625461I012625461
I012625461
 
G012143139
G012143139G012143139
G012143139
 
H017344752
H017344752H017344752
H017344752
 
H010216267
H010216267H010216267
H010216267
 
L017618790
L017618790L017618790
L017618790
 
I017335457
I017335457I017335457
I017335457
 
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...
Analysis of Stress Distribution in a Curved Structure Using Photoelastic and ...
 
I017315465
I017315465I017315465
I017315465
 
U01061151154
U01061151154U01061151154
U01061151154
 
C1804011117
C1804011117C1804011117
C1804011117
 
D010423139
D010423139D010423139
D010423139
 
J017417781
J017417781J017417781
J017417781
 
A017340104
A017340104A017340104
A017340104
 
D017642026
D017642026D017642026
D017642026
 
C1802022430
C1802022430C1802022430
C1802022430
 
Speed Control of FSTP Inverter Fed Induction Motor Drive with a Neural Networ...
Speed Control of FSTP Inverter Fed Induction Motor Drive with a Neural Networ...Speed Control of FSTP Inverter Fed Induction Motor Drive with a Neural Networ...
Speed Control of FSTP Inverter Fed Induction Motor Drive with a Neural Networ...
 
B1803050722
B1803050722B1803050722
B1803050722
 
H010615159
H010615159H010615159
H010615159
 
I012517285
I012517285I012517285
I012517285
 

Semelhante a G017444651

IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Editor IJMTER
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisIOSR Journals
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED IJCERT JOURNAL
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformCSCJournals
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataINFOGAIN PUBLICATION
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...IRJET Journal
 

Semelhante a G017444651 (20)

O017429398
O017429398O017429398
O017429398
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
K0815660
K0815660K0815660
K0815660
 
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and SteganalysisNew and Unconventional Techniques in Pictorial Steganography and Steganalysis
New and Unconventional Techniques in Pictorial Steganography and Steganalysis
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
Bp34412415
Bp34412415Bp34412415
Bp34412415
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED Design of an adaptive JPEG Steganalysis with UED
Design of an adaptive JPEG Steganalysis with UED
 
P017329498
P017329498P017329498
P017329498
 
An Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile CommunicationAn Architectural Approach of Data Hiding In Images Using Mobile Communication
An Architectural Approach of Data Hiding In Images Using Mobile Communication
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
High Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet TransformHigh Capacity and Security Steganography Using Discrete Wavelet Transform
High Capacity and Security Steganography Using Discrete Wavelet Transform
 
review.pptx
review.pptxreview.pptx
review.pptx
 
encryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text dataencryption based lsb steganography technique for digital images and text data
encryption based lsb steganography technique for digital images and text data
 
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
 

Mais de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

G017444651

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 4, Ver. IV (July – Aug. 2015), PP 46-51 www.iosrjournals.org DOI: 10.9790/0661-17444651 www.iosrjournals.org 46 | Page Data Hiding Inside the Image Using Uniform Embedding Techniques J. S. Harini, Student1 , 1 (Computer Science and Engineering, Sitams College / JNTUA, INDIA) I. Introduction The main aim of steganography is to hide data in the text media such as image, text, audio and video so that it cannot be identified by others. One of the advantages of steganography is that it can be used to transmit the secret messages without knowing the fact of transmission being discovered. In existing there are three effective methods applied to image steganography are 1. Least Significant Bit (LSB) substitution 2. Blocking 3. Palette Modification. The process of checking the bit of pixels into carrier image is known as LSB substitution.LSB is the most powerful steganographic method which lends itself. To maintain the confidentiality and integrity of data to prevent them from unauthorized persons. Transmitting the military data and data related to economic, industrial organization towards the information pertaining the institutions of finance and business must be confidential for transferring of data. As a result there is a need of information hiding which explains the general methods and techniques used in the area of security and confidentiality of information security for transferring them from one end to other this is one kind of problem emerged by the various means of communication. Encryption is the most important method used for transferring confidential data from one format to another format using certain was by the sender and the recipient restores it to the original form. The term steganography was derived from Greek terminology. The term stegano means hiding or restricting and the term graphy means text, drawing or writing. This method was existing from the Greeks age which was later developed on the advancement of communication. With the advancement of communication security has become an important issue. Steganography is used to hide the secret data inside other objects such as text images audio and video to protect the confidential data. After hiding the image it should be seen as singular object and as well as materialistic. The intruder will feel difficult to discover the stego object upon its transferring among the internet until it reaches extraction of secret data. Problem Definition: The art and science of hiding information by embedding messages with in other terminology harmless messages. Steganography works by replacing bits of useless or unused data in regular computer file (such as graphics, format, text, and html) with bits of different invisible information. There is a need for an algorithm to embed the message. This algorithm uses simple or complex LSB embedding in the spatial domain. The hiding process starts with embedding bits of the message in to the image. In LSB insertion technique we use the least significant bit to embed the message. To improve the embedding capacity, two or more bits in a pixel are used to embed messages by changing the LSB of pixel in a sequential order. The techniques that are available today are invisible to a human senses and most of it takes a gray color images as a special case. In order to embed a text message using a color image as a cover, two or more aspects must be considered: 1. Choose the pixel to embed. 2. Using a randomization technique by changing the LSB pixels to embed messages. Objectives: The main objectives are: 1. To select the pixel for an embedding a new technique is developed and designed. 2. Reduce the size for embedding the text. 3. To resist extraction process a high degree of confidentiality is given.
  • 2. Data Hiding Inside the Image Using Uniform Embedding Techniques DOI: 10.9790/0661-17444651 www.iosrjournals.org 47 | Page Significance of the problem: A special kind of problem is categorized through the digital image steganography problem, till now, there is no proper technique used to solve this problem, but many suggested algorithms give us good results. The LSB of the pixels in a BMP image mainly focuses on hiding the text message. In order to get some results about its ability to make the message store in a random way the study will mainly focus on choosing a pixel to embed a part of the text message under a conditional value. Since ancient times the term steganography exists and many of general assumptions apply till now. In the area of invisible digital watermarking motivated by the desire for copyright protection of multimedia through internet is the most of recent work undergone through steganography. To signify origin or ownership of the digital cover signal within a signature embedded is the objective of the digital watermarking. To embed a amount of data signified more than that of a serial number or signature within the cover signal is the objective of steganography. II. Literature Survey 1. Minimizing additive distortion in steganography using syndrome-trellis codes This paper proposes a complete practical methodology for minimizing additive distortion in steganography with general (nonbinary) embedding operation. Let every possible value of every stego element be assigned a scalar expressing the distortion of an embedding change done by replacing the cover element by this value. The total distortion is assumed to be a sum of per-element distortions. Both the payload-limited sender (minimizing the total distortion while embedding a fixed payload) and the distortion-limited sender (maximizing the payload while introducing a fixed total distortion) are considered. Without any loss of performance, the nonbinary case is decomposed into several binary cases by replacing individual bits in cover elements. The binary case is approached using a novel syndrome-coding scheme based on dual convolution codes equipped with the Viterbi algorithm. This fast and very versatile solution achieves state-of-the-art results in steganographic applications while having linear time and space complexity the number of covers elements. We report extensive experimental results for a large set of relative payloads and for different distortion profiles, including the wet paper channel. Practical merit of this approach is validated by constructing and testing adaptive embedding schemes for digital images in raster and transform domains. Most current coding schemes used in steganography (matrix embedding, wet paper codes, etc.) and many new ones can be implemented using this framework. 2. Modified matrix encoding technique for minimal distortion steganography It is well known that all information hiding methods that modify the least significant bits introduce distortions into the cover objects. Those distortions have been utilized by steganalysis algorithms to detect that the objects had been modified. It has been proposed that only coefficients whose modification does not introduce large distortions should be used for embedding. In this paper we propose an efficient algorithm for information hiding in the LSBs of JPEG coefficients. Our algorithm uses modified matrix encoding to choose the coefficients whose modifications introduce minimal embedding distortion. We derive the expected value of the embedding distortion as a function of the message length and the probability distribution of the JPEG quantization errors of cover images. Our experiments show close agreement between the theoretical prediction and the actual embedding distortion. Our algorithm can be used for both steganography and fragile watermarking as well as in other applications in which it is necessary to keep the distortion as low as possible. 3. Design of adaptive steganographic schemes for digital image Most steganographic schemes for real digital media embed messages by minimizing a suitably defined distortion function. In practice, this is often realized by syndrome codes which offer near-optimal rate-distortion performance. However, the distortion functions are designed heuristically and the resulting steganographic algorithms are thus suboptimal. In this paper, we present a practical framework for optimizing the parameters of additive distortion functions to minimize statistical detectability. We apply the framework to digital images in both spatial and DCT domain by first defining a rich parametric model which assigns a cost of making a change at every cover element based on its neighbourhood. Then, we present a practical method for optimizing the parameters with respect to a chosen detection metric and feature space. We show that the size of the margin between support vectors in soft-margin SVMs leads to a fast detection metric and that methods minimizing the margin tend to be more secure blind steganalysis. The parameters obtained by the Nelder--Mead simplex- reflection algorithm for spatial and DCT-domain images are presented and the new embedding methods are tested by blind steganalyzers utilizing various feature sets. Experimental results show that as few as 80 images are sufficient for obtaining good candidates for parameters of the cost model, which allows us to speed up the parameter search.
  • 3. Data Hiding Inside the Image Using Uniform Embedding Techniques DOI: 10.9790/0661-17444651 www.iosrjournals.org 48 | Page 4. Digital image steganography using universal distortion Currently, the most secure practical steganographic schemes for empirical cover sources embed their payload while minimizing a distortion function designed to capture statistical detectability. Since there exists a general framework for this embedding paradigm with established payload-distortion bounds as well as near- optimal practical coding schemes, building an embedding scheme has been essentially reduced to the distortion design. This is not an easy task as relating distortion to statistical detectability is a hard and open problem. In this article, we propose an innovative idea to measure the embedding distortion in one fixed domain independently of the domain where the embedding changes (and coding) are carried out. The proposed universal distortion is additive and evaluates the cost of changing an image element (e.g., pixel or DCT coefficient) from directional residuals obtained using a Daubechies wavelet filter bank. The intuition is to limit the embedding changes only to those parts of the cover that are difficult to model in multiple directions while avoiding smooth regions and clean edges. The utility of the universal distortion is demonstrated by constructing steganographic schemes in the spatial; JPEG, and side-informed JPEG domains, and comparing their security to current state- of-the-art methods using classifiers trained with rich media models. 5. Reversible Data Embedding Using a Difference Expansion In this paper, we present a novel reversible data embedding method for digital images. We explore the redundancy in digital images to achieve very high embedding capacity, and keep the distortion low. 6. On Compressing Encrypted Data In this paper, we investigate the novelty of reversing the order of these steps, i.e., first encrypting and then compressing, without compromising either the compression efficiency or the information-theoretic security. Although counter-intuitive, we show surprisingly that, through the use of coding with side information principles, this reversal of order is indeed possible in some settings of interest without loss of either optimal coding efficiency or perfect secrecy. III. Indentations and Equations Steganography Terminology Steganography system is divided into two operations as detailed below: 1- Embedding process: from which it can choose the cover then put secret messages included using the stego key that contains the secret message Stego Cover. 2- Extraction process: From which to extract the secret message using the secret key, and can be watched through the lid are moving between the sender and the recipient by the attackers who have no right to extract the secret message. System Architecture
  • 4. Data Hiding Inside the Image Using Uniform Embedding Techniques DOI: 10.9790/0661-17444651 www.iosrjournals.org 49 | Page Reversible Data Hiding: Reversible Data hiding Images is a technique, by which the original cover can be loss lessly recovered after the embedded message is extracted. In theoretical aspect, Kalker and Willems established a rate-distortion model for RDH, through which they proved the rate-distortion bounds of RDH for memory less covers and proposed a recursive code construction which, however, does not approach the bound. Improved the recursive code construction for binary covers and proved that this construction can achieve the rate-distortion bound as long as the compression algorithm reaches entropy, which establishes the equivalence between data compression and RDH for binary covers. Images encryption is an effective and popular means as it converts the original and meaningful content to incomprehensible one. Although few RDH techniques in encrypted images have been published yet, there are some promising applications if RDH can be applied to encrypted images. In advocated a reputation-based trust management scheme enhanced with data coloring (a way of embedding data into covers) and software watermarking, in which data encryption and coloring offer possibilities for upholding the content owner’s privacy and data integrity. Obviously, the cloud service provider has no right to introduce permanent distortion during data coloring into encrypted data. Thus, a reversible data coloring technique based on encrypted data is preferred. Suppose a medical image database is stored in a data center, and a server in the data center can embed notations into an encrypted version of a medical image through a RDH technique. With the notations, the server can manage the image or verify its integrity without having the knowledge of the original content, and thus the patient’s privacy is protected. On the other hand, a doctor, having the cryptographic key, can decrypt and restore the image in a reversible manner for the purpose of further diagnosing. Extracting Data from Encrypted Images: To manage and update personal information of images which are encrypted for protecting clients’ privacy, an inferior database manager may only get access to the data hiding key and have to manipulate data in encrypted domain. The order of data extraction before image decryption guarantees the feasibility of our work in this case. When the database manager gets the data hiding key, he can decrypt the LSB-planes of and extract the additional data by directly reading the decrypted version. When requesting for updating information of encrypted images, the database manager, then, updates information through LSB replacement and encrypts updated information according to the data hiding key all over again. As the whole process is entirely operated on encrypted domain, it avoids the leakage of original content. Extracting Data from Decrypted Images: In Case, both embedding and extraction of the data are manipulated in encrypted domain. On the other hand, there is a different situation that the user wants to decrypt the image first and extracts the data from the decrypted image when it is needed. The following example is an application for such scenario. Assume Alice outsourced her images to a cloud server, and the images are encrypted to protect their contents. Into the encrypted images, the cloud server marks the images by embedding some notation, including the identity of the images’ owner, the identity of the cloud server and time stamps, to manage the encrypted images. Note that the cloud server has no right to do any permanent damage to the images. Now an authorized user, Bob who has been shared the encryption key and the data hiding key, downloaded and decrypted the images. Bob hoped to get marked decrypted images, i.e., decrypted images still including the notation, which can be used to trace the source and history of the data. The order of image decryption before/without data extraction is perfectly suitable for this case. Next, we describe how to generate a marked decrypted image. Image Partition: The operator here for reserving room before encryption is a standard RDH technique, so the goal of image partition is to construct a smoother area , on which standard RDH algorithms such as can achieve better performance. To do that, without loss of generality, assume the original image is an 8 bits gray-scale image with its size and pixels. Image Encryption: After rearranged self-embedded image, denoted by , is generated, we can encrypts to construct the encrypted image, denoted by .With a stream cipher, the encryption version of is easily obtained. For example, a gray value ranging from 0 to 255 can be represented by 8 bits, , such that The encrypted bits can be calculated through exclusive- or operation where is generated via a standard stream cipher determined by the encryption key. Finally, we embed 10 bits information into LSBs of first 10 pixels in encrypted version of to tell data hider the number of rows and the number of bit-planes he can embed information into. Note that after image encryption, the data hider or a third party cannot access the content of original image without the encryption key, thus privacy of the content owner being protected.
  • 5. Data Hiding Inside the Image Using Uniform Embedding Techniques DOI: 10.9790/0661-17444651 www.iosrjournals.org 50 | Page Data Hiding in Encrypted Image: Once the data hider acquires the encrypted image, he can embed some data into it, although he does not get access to the original image. The embedding process starts with locating the encrypted version of , denoted by . Since has been rearranged to the top of , it is effortless for the data hider to read 10 bits information in LSBs of first 10 encrypted pixels. After knowing how many bit-planes and rows of pixels he can modify, the data hider simply adopts LSB replacement to substitute the available bit-planes with additional data. Finally, the data hider sets a label following to point out the end position of embedding process and further encrypts according to the data hiding key to formulate marked encrypted image denoted by. Anyone who does not possess the data hiding key could not extract the additional data. LSB: least significant bits The least significant bits have the useful property of changing rapidly if the number changes even slightly. For example, if 1 (binary 00000001) is added to 3 (binary 00000011), the result will be 4 (binary 00000100) and three of the least significant bits will change (011 to 100). By contrast, the three most significant bits stay unchanged (000 to 000). Least significant bits are frequently employed in pseudorandom number generators, hash functions and checksums. LSB, in all capitals, can also stand for “Least Significant Byte”. The meaning is parallel to the above: it is the byte (or octet) in that position of a multi-byte number which has the least potential value in Steganography a message might be hidden or encrypt with in in an image by changing least significant bit to be the message bits then the image can be transmitted through network.lsb based Steganography is perhaps the most simple and straight forward approach . in this will only affect each pixel by +-1, if at all ,it is generally assumed with good reason that degradation caused by this embedding process would perceptually transparent. hence there are number of lsb based Steganography techniques in the passive warden model as it difficult to differentiate cover-image from stego images ,given the small changes that have been made. There are many methods for steganography ,to hide the secret message into the image.LSB is the well known method for data hiding. The approaches for steganography that are based on LSB can be found .The another is PVD Method i.e. pixel-value differencing method divides the cover image into blocks and modifies the pixel difference in each block for data embedding. Gray-level modification Steganography is a technique to map data by modifying the gray level values of the image pixels. It uses the odd and even numbers to map data within an image. A Novel Steganographic Technique for Hiding Text behind Image There are two major steps. First one is embedding the secret message in cover media using stegokey the second one is extracting the secret message from the cover media using stegokey.For extraction the secret message from the stego-media the recipient must have the stego-key. Color histogram Techniques In image processing and photography, a color histogram is a representation of the distribution of colors in an image. For digital images, a color histogram represents the number of pixels that have colors in each of a fixed list of color ranges, that span the image's colour, the set of all possible colors. The color histogram can be built for any kind of color space, although the term is more often used for three-dimensional spaces like RGB or HSV. For monochromatic images, the term intensity histogram may be used instead. For multi- spectral images, where each pixel is represented by an arbitrary number of measurements (for example, beyond the three measurements in RGB), the color histogram is N-dimensional, with N being the number of
  • 6. Data Hiding Inside the Image Using Uniform Embedding Techniques DOI: 10.9790/0661-17444651 www.iosrjournals.org 51 | Page measurements taken. Each measurement has its own wavelength range of the light spectrum, some of which may be outside the visible spectrum. If the set of possible color values is sufficiently small, each of those colors may be placed on a range by itself; then the histogram is merely the count of pixels that have each possible color. Most often, the space is divided into an appropriate number of ranges, often arranged as a regular grid, each containing many similar color values. The color histogram may also be represented and displayed as a smooth function defined over the color space that approximates the pixel counts. IV. Conclusion The effectiveness of the proposed scheme is verified with evidence obtained from exhaustive experiments using popular steganalyzers with various feature sets on the BOSSbase database. Compared with prior arts, the proposed scheme gains favourable performance in terms of secure embedding capacity against steganalysis. Acknowledgements The authors would like to thank the anonymous reviewers and associate editor for their comments that greatly improved the manuscript. I express my heartful thanks to my project guide Dr. P. NEELAKANTAN, for his guidance and support at each and every stage of the project. References Theses [1]. (Piyush Goel),Data Hiding in Digital Images: A Steganographic Paradigm [2]. (Dr. Oleg Victorov), Enhancement of A Steganographic algorithm for Hiding Text Messages in Images Websites WWW.google.com [3]. T. Filler, J. Judas, and J. Fridrich, “Minimizing additive distortion insteganography using syndrome-trellis codes,” IEEE Trans. Inf. ForensicsSecurity, vol. 6, no. 3, pp. 920–935, Sep. 2011.(Ref no.1.)