Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
nadeemalakhtar@gmail.com, saksaplanet@ymail.com,johri.7405@gmail.com
Cover
Image
Figure 1.
Message
Stego
Image
Image
L..=:==:::r
pattern of some bits of the pixels. In this way, less number of pixels
is modified in comparison to plain LSB method. So PSNR of stego
image is improved. For correct de-steganography, the bit patterns
for which LSBs has inverted needs to be stored within the stego
Stego
Cover
Image
Image
with
other
methods
to
improve
the
Figure 2.
steganography
further. (Abstract)
The
INTRODUCTION
of
data.
Steganography
provides
writing."
communications
It
includes
methods
that
are
that
it
is
(LSB)
simple
to
Least-Significant-Bit
of
embedding
concealing
data
Image
advantages
steganographic
Message
vast
conceal
array
the
of
message's
secret
very
robustness
[6].
The
LSB
based
technique
is
good
at
749
than plain
LSB
method.
LSB
replacement
allows
simply
replacing
the
IMPLEMENTA nON
quality [ 1 2]. So, the change in amplitude is very small and this
is
that
if
an
attacker
suspects
B. Proposed Method:
some
that
To
understand
both
the
schemes,
following
First Scheme
Four message bits 1 0 1 1 are to be hidden into four cover
image pixels 1 000 1 1 00, 1 0 1 0 1 1 0 1 , 1 0 1 0 1 0 1 1 and 1 0 1 0 1 1 0 1 .
After plain LSB steganography,
00 1 1 1 1 1 1
1 000 1 00 1
00 1 0 1 000
1 0 1 0 1 00 1
1 1 1 1 1 1 00
00 1 0000 1
00 1 1 1 0 1 1
1 1 1 00000
to store the fact that we have inverted the LSBs of those pixels
in which second and third LSB are 0 and 1 respectively.
If we consider two bits, there are four (00, 1 0, 1 0, II)
Message Image:
10101010
whose LSB has changed and second type i.e. whose has not
Steganographed Image:
00 1 1 1 1 1 1
1 000 1 000
00 1 0 1 001
1 0 1 0 1 000
1 1 1 1 1 1 01
00 1 00000
00 1 1 1 0 1 0
1 1 1 00001
750
2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
Second Scheme
In the second scheme, we assume that original cover image
has
already
been
transferred
to
the
receiver.
With
this
2nd
and
3'd
we find
2nd
3rd
and
2nd
and
3rd
LSB
I)
2nd
and
3rd
LSB
3rd, 2nd
and 1 st LSB.
2nd
and
3rd
LSB pattern in
(3rd, 2nd,
analysis
and
bit
inversion
decisions
for
Crods
The total pixel benefit in this scheme is more than (or equal
to) pixel benefit in second scheme because eight patterns are
checked whereas in the first scheme only four patterns (all
combinations of
For the Crods image when embedded into Baboon using first
scheme, in Table I, number of unchanged bits is much less than
III.
(a),
2n
and
3rd
20J4 Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
751
TABLE I.
Bit
Changed
Not
Invert
Changed
pattern
rd
nd
(3 , 2
Bits
Changed
Bits in
Bits
LSB
Changed
Not
Bits
Changed
Changed
Bits in
Bits
Final
LSB)
Invert?
Final
Image
Image
First Scheme
Second Scheme
Cover Image: Baboon
Changed Bits in Simple LSB=243291
00
110787
73293
YES
73293
01
64053
139729
NO
64053
10
35126
32772
YES
32772
11
33325
35203
NO
33325
13411
41880
97376
31413
43334
133139
20719
6590
7556
23848
27570
8924
8948
27425
24377
7778
No
Yes
No
Yes
No
Yes
No
Yes
203443
44824
49924
16480
16726
127954
122158
73095
YES
73095
01
31354
53239
NO
31354
10
80392
54662
YES
54662
11
49793
59595
NO
49793
TABLE II.
10315
33669
111843
39426
14930
48309
16424
4930
Yes
9510
31460
No
70882
23202
15083
49037
34710
10558
No
Yes
No
Yes
No
Yes
49741
19860
32712
25641
127954
208904
Bit
Change
Not
Invert
Change
pattern
rd
nd
(3 , 2
d Bits
Change
d Bits in
LSB)
LSB
Change
Not
Invert
Changed
d Bits
Change
Bits in
Final
Final
Bits
Image
Bits
Image
First Scheme
Second Scheme
Cover Image: Baboon
Changed Bits in Simple LSB=253325
00
100411
83669
Yes
83669
01
84419
119363
No
84419
10
34682
33216
Yes
33216
11
33813
34715
No
33813
752
235117
20879
34412
79532
49257
67600
108873
16819
10490
12057
19347
22625
13869
Yes
14024
22349
No
19789
12366
No
Yes
No
Yes
No
Yes
70136
78090
25926
26390
200542
2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
110417
84836
Yes
84836
01
37249
47344
No
37249
10
73583
61471
Yes
61471
11
52402
56986
No
52402
16885
27099
No
93532
57737
Yes
24171
39068
No
13078
8276
Yes
15564
25406
No
58019
36065
Yes
24489
39631
No
27913
17355
Yes
32447
51629
41844
169904
235958
TABLE III.
43984
Message Image
Cover Image
Before Inversion
Scheme 1
Scheme 2
Crods
Baboon
54.47
55.25
57.26
Pentagon
55.16
55.16
57.26
JuliaSet
53.80
55.13
57.26
Baboon
53.68
56.05
61.21
Pentagon
52.86
55.99
61.21
JuliaSet
54.99
56.08
61.21
Baboon
54.08
54.34
54.62
Pentagon
53.95
54.35
54.62
JuliaSet
54.18
54.31
54.62
Baboon
54.30
54.62
55.31
Pentagon
54.60
54.60
55.31
JuliaSet
53.96
54.60
55.31
Baboon
54.34
54.80
55.78
Pentagon
54.81
54.81
55.78
JuliaSet
53.73
54.95
55.78
Baboon
54.08
54.40
54.76
Pentagon
53.90
54.41
54.76
JuliaSet
54.27
54.41
54.76
TestPat
F16
FishingBoat
Laser
Clock
PSNR
20J4 Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
753
2
3
4
5
6
1=
1111111111=;
III =
== III
III
I
=
-
== III
== III
== III
==
111=
III == l
III
(b)
(a)
(c)
- ..
- .
.... - ..
. - .
..
. - ...
II
- -
--
...
(e)
(d)
Figure 3.
(I)
Message images (a) Crods (b) TestPat (c) FI6 (d) FishingBoat (e) Laser (I) Clock
(a)
(b)
Figure 4.
754
. -
(c)
2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
IV.
[3]
CONCLUSION
[4]
[5]
[6]
[7]
.NET Magazine.http://www.garykessler.netllibrary/steganography.btml
[8]
quality.
In future work, other bit combinations of cover image pixels
can be considered. There are
21 C C2)
[9]
[10]
c.c. Thien, J.C. Lin, A simple and high-hiding capacity method for
[2]
[11]
[12]
[l3]
[14]
Wu, Nan-I., and Min-Shiang Hwang. "Data Hiding: Current Status and
Key Issues." IJ Network Security 4.1 (2007): 1-9.
R. Chandramouli, N. Memon, "Analysis of LSB Based Image
Steganography Techniques", IEEE pp. 1019-1022, 2001.
Cox, Ingemar, et al. Digital watermarking and steganography. Morgan
Kaufmann, 2007.
The USC-SIPI Image database http://sipi.usc.eduldatabase/
20J4 Internationai Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
755