SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
IOSR Journal of VLSI and Signal Processing (IOSR-JVSP)
Volume 7, Issue 1, Ver. I (Jan. - Feb. 2017), PP 33-37
e-ISSN: 2319 โ€“ 4200, p-ISSN No. : 2319 โ€“ 4197
www.iosrjournals.org
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 33 | Page
A Hybrid Steganography Technique Based On LSBMR
And OPAP
Varun sangwan
Sangwan.varun@gmail.com
Abstract: This paper presents a steganography technique based on two existing methods of data hiding i.e.
LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The
center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed
data using LSBMR. The experimental results show that the proposed method provides better embedding capacity
while maintaining the good image quality. The improved performance is shown in comparison to other data hiding
methods that are investigated in this study.
Keywords: steganography, imperceptibility, least-significant-bit matching revisited (LSBMR), Optimal-pixel-
adjustment process (OPAP).
I. Introduction
The Internet has emerged as a powerful tool for communication over the past decade. It has provided an
open and connected environment to its users. Communicating over the Internet is fast and hassle-free but there are
few risks attached with it, which cannot be ignored. The biggest nightmare that surrounds the Internet today is
privacy. Privacy may be compromised whenever some confidential information is transferred from one person to
the other over this open network. To resolve this issue there is a need of a technique through which the information
can be transferred secretly. Secure communication between two entities is when the information is transferred in a
way that is insusceptible to eavesdropping. Various information hiding techniques are available that facilitate two
parties to communicate in secret.
Steganography is one such branch of data hiding. The primary goal of steganography is to conceal the
message being communicated within some cover media. The digital cover media used for this purpose can be an
image, audio, video, text etc [1]. Digital images are widely used in steganography in comparison to other available
cover media due to their high abundance on the Internet. In this paper, the cover media used is an image and the
secret data used in the form of text.
Steganography can be performed in various domains but the spatial domain techniques are more popular
than others due to their simplicity and less time complexity. In this paper, one such spatial time domain technique
has been proposed. The spatial domain methods can be divided into three categories: (i) high embedding capacity
approaches with acceptable image quality, (ii) high image quality approaches with reasonable hiding capacity and
(iii) restricted embedding capacity approaches with a slight distortion in the quality of the image.
First category of spatial domain approaches focuses on increasing the embedding capacity of cover media
[2]. Well-known least-significant-bit (LSB) substitution method lies under this category. In this method, k-LSB bits
are replaced with secret data bits. Second category of spatial domain approaches consists of adaptive
steganographic methods which makes use of the properties of human visual system (HVS) i.e. hiding more data in
edge areas and less data in smooth areas.
The third category of spatial domain approaches provides restricted embedding capacity while
maintaining high robustness against steganalysis attacks. One such technique is LSBMR that keeps the cover media
unchanged and therefore, less susceptible to attacks.
This paper, focuses on second category methods and proposes a new steganographic algorithm that makes
use of LSBMR [3] and OPAP [2] to embed secret data into grayscale cover images. This method consists of two
stages. In first stage, the cover image is partitioned into blocks of three consecutive pixels. The center pixel is
embedded with k-bits of secret data using LSB substitution and is adjusted accordingly by OPAP for data recovery
on the other side. The other two pixels are embedded with one bit each using LSBMR. In the second stage, the data
is extracted from stego image.
The remaining sections of the paper is organised as follows. In section II, the literature review is
described. In Section III, the proposed method is presented. In section IV, several experimental results are
presented to demonstrate the performance of proposed scheme. Finally, conclusions are given in Section V.
A hybrid steganography technique based on LSBMR and OPAP
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 34 | Page
II. Literature Review
2.1 PVD method
In 2003, Wu and Tsai used basic property of HVS system and presented a steganography method using
PVD [4]. This method hides different amount of secret bits in consecutive non-overlapping pixel pairs by taking
the difference value between the pixels of a pixel pair. This method partitions the given cover image into non-
overlappings blocks with two consecutive pixels, say ๐‘๐‘– and ๐‘๐‘–+1 .Wu and Tsai designed a range table ๐‘…๐‘— with
ranges varying from 0 to 255. The range table ๐‘…๐‘— has six ranges as ๐‘…1=[0,7], ๐‘…2=[8,15], ๐‘…3=[16,31], ๐‘…4=[32,63],
๐‘…5=[64,127] and ๐‘…6=[128,255]. The lower bound and upper bound value of each range is given by ๐‘™๐‘— and ๐‘ข๐‘— . Also,
the width of each range is given by ๐‘…๐‘— =๐‘ข๐‘— โˆ’ ๐‘™๐‘— + 1. The method of hiding secret data into the non-overlapping
blocks is as follows:
1. Calculate the difference value between the two pixels of each block, ๐‘‘๐‘– = ๐‘๐‘– โˆ’ ๐‘๐‘–+1 .
2. Find the range to which the above calculated ๐‘‘๐‘– belongs to.
3. Compute how many bits of secret data can be embedded in each block of pixel pair, ๐‘ก๐‘— = ๐‘™๐‘œ๐‘”2 ๐‘…๐‘— .
4. Read ๐‘ก๐‘— bits from the binary secret data stream and covert into a decimal value ๐‘ ๐‘–.
5. Calculate the new difference value, ๐‘‘๐‘–
โ€ฒ
= ๐‘™๐‘— + ๐‘ ๐‘–.
6. Modify the pixels ๐‘๐‘– and ๐‘๐‘–+1 as,
๐‘๐‘–
โ€ฒ
, ๐‘๐‘–+1
โ€ฒ
=
๐‘๐‘– +
๐‘ง
2
, ๐‘๐‘–+1 โˆ’
๐‘ง
2
๐‘–๐‘“ ๐‘๐‘– โ‰ฅ ๐‘๐‘–+1 ๐‘Ž๐‘›๐‘‘ ๐‘‘๐‘–
โ€ฒ
> ๐‘‘๐‘–
๐‘๐‘– โˆ’
๐‘ง
2
, ๐‘๐‘–+1 +
๐‘ง
2
๐‘–๐‘“ ๐‘๐‘– < ๐‘๐‘–+1 ๐‘Ž๐‘›๐‘‘ ๐‘‘๐‘–
โ€ฒ
> ๐‘‘๐‘–
๐‘๐‘– โˆ’
๐‘ง
2
, ๐‘๐‘–+1 +
๐‘ง
2
๐‘–๐‘“ ๐‘๐‘– โ‰ฅ ๐‘๐‘–+1 ๐‘Ž๐‘›๐‘‘ ๐‘‘๐‘–
โ€ฒ
โ‰ค ๐‘‘๐‘–
๐‘๐‘– +
๐‘ง
2
, ๐‘๐‘–+1 โˆ’
๐‘ง
2
๐‘–๐‘“ ๐‘๐‘– < ๐‘๐‘–+1 ๐‘Ž๐‘›๐‘‘ ๐‘‘๐‘–
โ€ฒ
โ‰ค ๐‘‘๐‘–
(1)
where ๐‘ง = ๐‘‘๐‘– โˆ’ ๐‘‘๐‘–
โ€ฒ
. This process is repeated for each of the block to obtain the stego image.
2.2 PVD and LSB replacement method
In 2005, Wu et al. proposed a steganographic method inspired by PVD technique [5]. This method
partitions the given cover image into non-overlappings blocks with two consecutive pixels, say ๐‘๐‘– and ๐‘๐‘–+1. Here,
the range table ๐‘…๐‘— with ranges varying from 0 to 255 is divided into โ€žlower levelโ€Ÿ and โ€žhigher levelโ€Ÿ. In case of
div=15, lower level contains ranges ๐‘…1 =[0,7] and ๐‘…2 =[8,15] while higher level contains ranges ๐‘…3 =[16,31],
๐‘…4=[32,63], ๐‘…5=[64,127] and ๐‘…6=[128,255]. The lower bound and upper bound value of each range is given by ๐‘™๐‘—
and ๐‘ข๐‘— . Also, the width of each range is given by ๐‘…๐‘— =๐‘ข๐‘— โˆ’ ๐‘™๐‘— + 1. Now, for each block difference value is
calculated as, ๐‘‘๐‘– = ๐‘๐‘– โˆ’ ๐‘๐‘–+1 .
Case I: If the difference value ๐‘‘๐‘–falls in the range of lower level, then LSB substitution method is used to embed 6-
bits of secret data. The procedure is as follows:
Let the 6-bits secret data is S=๐‘Ž1, ๐‘Ž2, ๐‘Ž3, ๐‘Ž4, ๐‘Ž5, ๐‘Ž6.
1. Replace 3-LSB of ๐‘๐‘– with ๐‘Ž1, ๐‘Ž2, ๐‘Ž3 to obtain ๐‘๐‘–
โ€ฒ
.
2. Replace 3-LSB of ๐‘๐‘–+1 with ๐‘Ž4, ๐‘Ž5, ๐‘Ž6 to obtain ๐‘๐‘–+1
โ€ฒ
.
3. Calculate the new difference value ๐‘‘๐‘–
โ€ฒ
= ๐‘๐‘–
โ€ฒ
โˆ’ ๐‘๐‘–+1
โ€ฒ
.
4. If the new difference value falls in the higher level, then perform the readjusting operation.
๐‘๐‘–
โ€ฒ
, ๐‘๐‘–+1
โ€ฒ
=
๐‘๐‘–
โ€ฒ
โˆ’ 8, ๐‘๐‘–+1
โ€ฒ
+ 8 ๐‘–๐‘“ ๐‘๐‘–
โ€ฒ
โ‰ฅ ๐‘๐‘–+1
โ€ฒ
๐‘๐‘–
โ€ฒ
+ 8, ๐‘๐‘–+1
โ€ฒ
โˆ’ 8 ๐‘–๐‘“ ๐‘๐‘–
โ€ฒ
< ๐‘๐‘–+1
โ€ฒ
(2)
Case II: If the difference value ๐‘‘๐‘– falls in the higher level range then PVD method is used to embed secret data bits
in pixel pairs.
III. Proposed work
This section describes the proposed steganographic method for greyscale cover images. The method consists of two
phases: (i) embedding phase and (ii) extracting phase.
3.1 Embedding phase
First the cover image is partitioned into non-overlapping blocks in raster scan manner. Each block has three
consecutive pixels in which the center pixel is named as ๐‘๐‘–๐‘ and the first and third pixels are ๐‘๐‘–1 and ๐‘๐‘–2. The
procedure of embedding data is as follows [6]:
1. Consider the k-LSBs of ๐‘๐‘–๐‘ where k โˆˆ{3,4,5,6} and transform them into a decimal value ๐ฟ๐‘†๐ต๐‘–.
A hybrid steganography technique based on LSBMR and OPAP
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 35 | Page
2. Read k-bits of secret data (i.e. k โˆˆ{3,4,5,6}) and replace the k-LSBs of ๐‘๐‘–๐‘ with these k-bits of secret data to
obtain๐‘๐‘–๐‘
โ€ฒ
. Also, covert the k-secret data bits into decimal equivalent, say ๐‘ ๐‘–๐‘ .
3. Compute the difference value, d=๐ฟ๐‘†๐ต๐‘– โˆ’ ๐‘ ๐‘–๐‘ .
4. Using OPAP modify the value of ๐‘๐‘–๐‘โ€ฒ
as follows:
๐‘๐‘–๐‘
โ€ฒ
=
๐‘๐‘–๐‘
โ€ฒ
+ 2 ๐‘˜
๐‘–๐‘“ ๐‘‘ > 2 ๐‘˜โˆ’1
๐‘Ž๐‘›๐‘‘ 0 โ‰ค ๐‘๐‘–๐‘
โ€ฒ
+ 2 ๐‘˜
โ‰ค 255
๐‘๐‘–๐‘
โ€ฒ
โˆ’ 2 ๐‘˜
๐‘–๐‘“ ๐‘‘ < โˆ’2 ๐‘˜โˆ’1
๐‘Ž๐‘›๐‘‘ 0 โ‰ค ๐‘๐‘–๐‘
โ€ฒ
โˆ’ 2 ๐‘˜
โ‰ค 255
๐‘๐‘–๐‘
โ€ฒ
๐‘œ๐‘ก ๐‘• ๐‘’๐‘Ÿ๐‘ค๐‘–๐‘ ๐‘’
(3)
5. For data hiding in first and third pixel follow the four cases:
Case I: LSB(๐‘๐‘–1) = ๐‘ ๐‘–1& ๐‘“ ๐‘๐‘–1, ๐‘๐‘–2 = ๐‘ ๐‘–2
๐‘๐‘–1
โ€ฒ
, ๐‘๐‘–2
โ€ฒ
= (๐‘๐‘–1, ๐‘๐‘–2)
Case II: LSB(๐‘๐‘–1) = ๐‘ ๐‘–1& ๐‘“ ๐‘๐‘–1, ๐‘๐‘–2 โ‰  ๐‘ ๐‘–2
๐‘๐‘–1
โ€ฒ
, ๐‘๐‘–2
โ€ฒ
= (๐‘๐‘–1, ๐‘๐‘–2 ยฑ 1)
Case III: LSB(๐‘๐‘–1) โ‰  ๐‘ ๐‘–1& ๐‘“ ๐‘๐‘–1 โˆ’ 1, ๐‘๐‘–2 = ๐‘ ๐‘–2
๐‘๐‘–1
โ€ฒ
, ๐‘๐‘–2
โ€ฒ
= (๐‘๐‘–1 โˆ’ 1, ๐‘๐‘–2)
Case IV: LSB(๐‘๐‘–1) โ‰  ๐‘ ๐‘–1& ๐‘“ ๐‘๐‘–1 โˆ’ 1, ๐‘๐‘–2 โ‰  ๐‘ ๐‘–2
๐‘๐‘–1
โ€ฒ
, ๐‘๐‘–2
โ€ฒ
= (๐‘๐‘–1 + 1, ๐‘๐‘–2)
where ๐‘“ ๐‘๐‘–1, ๐‘๐‘–2 = ๐ฟ๐‘†๐ต(
๐‘ ๐‘–1
2
+ ๐‘๐‘–2) and ๐‘ ๐‘–1, ๐‘ ๐‘–2denote two secret bits to be embedded. After embedding process
new block will have pixels ๐‘๐‘–1
โ€ฒ
, ๐‘๐‘–๐‘
โ€ฒ
, ๐‘๐‘–2
โ€ฒ
. The above procedure will be repeated for each block of cover image to
obtain the stego image.
3.2 Extracting phase
In this section the embedded data is recovered from stego image. The stego image is partitioned into non-
overlapping blocks of three pixels each. Then select the second pixel of the block first and perform the extraction
process as follows:
1. Extract the secret data bits from k-LSBs of ๐‘๐‘–๐‘
โ€ฒ
and call it ๐‘ ๐‘–๐‘ .
2. Obtain ๐‘ ๐‘–1 and ๐‘ ๐‘–2 using the relation,
๐‘ ๐‘–1 = ๐ฟ๐‘†๐ต(๐‘๐‘–1
โ€ฒ
)
๐‘ ๐‘–2 = ๐‘“(๐‘๐‘–1
โ€ฒ
, ๐‘๐‘–2
โ€ฒ
)
Concatenate ๐‘ ๐‘–๐‘ ,๐‘ ๐‘–1 and ๐‘ ๐‘–2 to obtain the original secret data bit stream. Apply the above procedure on each block to
extract the whole secret data bits.
IV. Experimental Results
This section presents the experimental results of the proposed method and compares the results with the
results of PVD method and PVD &LSB replacement method. The test images used for verifying the results are
greyscale images of size 512X512, namely โ€žLenaโ€Ÿ, โ€žPeppersโ€Ÿ, โ€žBaboonโ€Ÿ and โ€žBoatโ€Ÿ. Generally, for performance
evaluation of data hiding methods, four criteria are utilized [7]: (i) imperceptibility of stego images, (ii) the
embedding capacity, (iii) the complexity and (iv) the robustness of data embedding algorithm. The proposed
method tries to satisfy these criteria satisfactorily.
The PSNR value is used to evaluate the distortions of the stego images [8]. It can be computed as
๐‘€๐‘†๐ธ =
1
๐‘€ร—๐‘
2
1 1
( ( , ) ( , ))
M N
i j
I i j Y i j
๏€ฝ ๏€ฝ
๏€ญ๏ƒฅ๏ƒฅ (4)
๐‘ƒ๐‘†๐‘๐‘… = 10๐‘™๐‘œ๐‘”10
๐‘€๐‘Ž๐‘ฅ 2
๐‘€๐‘†๐ธ
(5)
where MxN denotes the size of the cover image I and stego image Y. a high PSNR value means good quality of
stego image and is highly imperceptible whereas a low PSNR means the opposite. Fig. 1. shows the similarity
between cover images and its corresponding stego images and hence proves the proposed method is highly
imperceptible.
A hybrid steganography technique based on LSBMR and OPAP
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 36 | Page
Table 1. Comparisons of the results between PVD, PVD & LSB replacement and the Proposed method.
The embedding capacity of the proposed method increases as the k value increases whereas the PSNR
value decreases. The distortions occurred due to increase in embedding capacity are slight and indistinguishable.
Table 1 shows the comparison of PSNR values and embedding capacity of the proposed method with the PVD and
PVD&LSB replacement methods. Here, the proposed method performs better than the PVD method in both criteria
whereas its better than second method in PSNR value and not in terms of embedding capacity.
Generally, the methods designed in spatial domain have a low time complexity. The proposed method
falls under spatial domain and also, in this method there is no requirement of readjusting phase or knowledge of
any range table as required by PVD and PVD &LSB replacement methods. Thus, the time complexity of the
proposed method is low.
(a) (b)
Fig. 2. (a) standard cover images (b) stego images embedded with data using proposed method.
A hybrid steganography technique based on LSBMR and OPAP
DOI: 10.9790/4200-0701013337 www.iosrjournals.org 37 | Page
Besides providing large data hiding capacity and good quality of stego image, a steganographic method
needs to be resistant against various steganalytic attacks [9],[10]. Mostly the steganalysers are based on image
histogram, therefore, if the histogram characteristics are preserved properly then there is possibility of achieving
high resistance against the well-known detectors. The proposed method maintains less changes in histogram as the
PSNR value is good and the stego image is imperceptible.
V. Conclusions
This paper has presented a hybrid steganographic technique based on LSMR and OPAP. This method can
hide large amount of secret data as well as provide an imperceptible stego image quality while compensating for
the dissimilarity between the histograms of the cover and stego images.. The efficacy of the proposed method is
verified via several experimental results that yielded better performance in comparison with PVD and PVD-LSB
replacement method.
References
[1] F. Petitcolas, R. Anderson, and M. Kuhn, โ€œInformation hiding- a survey,โ€ Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078, 1999.
[2] C.K. Chan, L.M. Cheng, โ€œHiding data in image by simple LSB substitutionโ€, pattern recognition, vol. 37, no. 3, 2004, pp. 469-474.
[3] J. Mielikainen, โ€œLSB matching revisited,โ€ IEEE Signal Process. Lett., vol. 13, no. 5, 2006, pp. 285-287.
[4] D. C. Wu and W. H. Tsai, โ€œA steganographic method for images by pixel-value-differencing,โ€ Pattern Recognit. Lett., vol. 24, no. 9-10,
pp. 1613-1626, 2003.
[5] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, โ€œImage steganographic scheme based on pixel-value-differencing and LSB
replacement methods,โ€ Proc. Inst. Elect. Eng.,Vis. Images Signal Process., vol. 152, no. 5, pp. 611-615, 2005.
[6] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, โ€œ A high quality steganographic method with pixel value differencing and
modulus function,โ€ The Journal of Sys.and Soft., vol.81, pp. 150-158, 2008.
[7] C.-H. Yang, C.-Y. Weng, S.-J. Wang and H.-M. Sun, โ€œAdaptive data hiding in edge areas of images with spatial LSB domain systems,โ€
IEEE Trans. Inf. Forensics Sec., vol. 3, no. 3, pp. 488-497, 2008.
[8] M. Khodaei and K. Faez, โ€œNew adaptive steganographic method using least-significant-bit substitution and pixel-value differencing,โ€
IET Image Processing, vol. 6, iss. 6, pp. 677-686, 2012.
[9] J. Fridrich, M. Goljan, and R. Du, โ€œRelaiable detection of LSB steganography in color and grayscale images,โ€ Proc. ACM Workshop on
Multi. And Sec., pp. 61-75, 2000.
[10] A. Westfeld, A. Pfitzmann, โ€œAttacks on stegographic systemsโ€, Lecture Notes in Computer Science, vol. 1768, 2000, pp. 61-75.
[11] The USC-SIPI Image Database, http://sipi.usc.edu/database.
[12] Amit bhanwala, Mayank kumar, yogendra Kumar,โ€ FPGA based Design of Low Power Reconfigurable Router for Network on Chip
(NoC)โ€, ISBN:978-1-4799-8890 ยฉ2015 IEEE,International Conference on Computing, Communication and Automation (ICCCA2015),
pp- 1320 - 1326, DOI: 10.1109/CCAA.2015.7148581.
[13] Mayank kumar, Kishore kumar, sanjiv kumar gupta, yogendra Kumar,โ€ FPGA based Design of Area efficient router Architecture for
Network on Chip (NoC)โ€, IEEE,International Conference on Computing, Communication and Automation (ICCCA2016), pp-1600 -
1605, DOI: 10.1109/CCAA.2016.7813980.

Weitere รคhnliche Inhalte

Was ist angesagt?

A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
ย 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONIJNSA Journal
ย 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporaryprjpublications
ย 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
ย 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
ย 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205IJNSA Journal
ย 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Akash Rawat
ย 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
ย 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
ย 
Data Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterData Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterCSCJournals
ย 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganographyIAEME Publication
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
ย 

Was ist angesagt? (13)

A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
ย 
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATIONUSING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
ย 
A comprehensive survey of contemporary
A comprehensive survey of contemporaryA comprehensive survey of contemporary
A comprehensive survey of contemporary
ย 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
ย 
Az2419511954
Az2419511954Az2419511954
Az2419511954
ย 
Ijnsa050205
Ijnsa050205Ijnsa050205
Ijnsa050205
ย 
Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...Ieee a secure algorithm for image based information hiding with one-dimension...
Ieee a secure algorithm for image based information hiding with one-dimension...
ย 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
ย 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
ย 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
ย 
Data Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity CharacterData Hiding Method With High Embedding Capacity Character
Data Hiding Method With High Embedding Capacity Character
ย 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ย 

ร„hnlich wie A Hybrid Steganography Technique Based On LSBMR And OPAP

An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...IOSRJVSP
ย 
Id62
Id62Id62
Id62IJEEE
ย 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
ย 
Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Budi Santo
ย 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
ย 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
ย 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
ย 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020Editor IJCATR
ย 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed satIAESIJEECS
ย 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decompositionZiadAlqady
ย 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
ย 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...IJECEIAES
ย 
Substitution-diffusion based Image Cipher
Substitution-diffusion based Image CipherSubstitution-diffusion based Image Cipher
Substitution-diffusion based Image CipherIJNSA Journal
ย 

ร„hnlich wie A Hybrid Steganography Technique Based On LSBMR And OPAP (20)

An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
An Improved Adaptive Steganographic Method Based on Least Significant Bit Sub...
ย 
Id62
Id62Id62
Id62
ย 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
ย 
Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057Santoso 2019 j._phys.__conf._ser._1175_012057
Santoso 2019 j._phys.__conf._ser._1175_012057
ย 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
ย 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ย 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
ย 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
ย 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
ย 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ย 
Improving wpt color_image_decomposition
Improving wpt color_image_decompositionImproving wpt color_image_decomposition
Improving wpt color_image_decomposition
ย 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
ย 
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
ย 
Substitution-diffusion based Image Cipher
Substitution-diffusion based Image CipherSubstitution-diffusion based Image Cipher
Substitution-diffusion based Image Cipher
ย 

Mehr von IOSRJVSP

PCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewPCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewIOSRJVSP
ย 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesIOSRJVSP
ย 
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...IOSRJVSP
ย 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...IOSRJVSP
ย 
Analyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAMAnalyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAMIOSRJVSP
ย 
Robust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceRobust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceIOSRJVSP
ย 
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...IOSRJVSP
ย 
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...IOSRJVSP
ย 
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...IOSRJVSP
ย 
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...IOSRJVSP
ย 
P-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWTP-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWTIOSRJVSP
ย 
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...IOSRJVSP
ย 
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...IOSRJVSP
ย 
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...IOSRJVSP
ย 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIOSRJVSP
ย 
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...IOSRJVSP
ย 
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesRetinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesIOSRJVSP
ย 
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionSpeech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionIOSRJVSP
ย 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...IOSRJVSP
ย 
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...IOSRJVSP
ย 

Mehr von IOSRJVSP (20)

PCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-ReviewPCIe BUS: A State-of-the-Art-Review
PCIe BUS: A State-of-the-Art-Review
ย 
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic TechniquesImplementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
Implementation of Area & Power Optimized VLSI Circuits Using Logic Techniques
ย 
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
Design of Low Voltage D-Flip Flop Using MOS Current Mode Logic (MCML) For Hig...
ย 
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
Measuring the Effects of Rational 7th and 8th Order Distortion Model in the R...
ย 
Analyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAMAnalyzing the Impact of Sleep Transistor on SRAM
Analyzing the Impact of Sleep Transistor on SRAM
ย 
Robust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory InterfaceRobust Fault Tolerance in Content Addressable Memory Interface
Robust Fault Tolerance in Content Addressable Memory Interface
ย 
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
Color Particle Filter Tracking using Frame Segmentation based on JND Color an...
ย 
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
Design and FPGA Implementation of AMBA APB Bridge with Clock Skew Minimizatio...
ย 
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
Simultaneous Data Path and Clock Path Engineering Change Order for Efficient ...
ย 
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
Design And Implementation Of Arithmetic Logic Unit Using Modified Quasi Stati...
ย 
P-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWTP-Wave Related Disease Detection Using DWT
P-Wave Related Disease Detection Using DWT
ย 
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
Design and Synthesis of Multiplexer based Universal Shift Register using Reve...
ย 
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
Design and Implementation of a Low Noise Amplifier for Ultra Wideband Applica...
ย 
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ElectroencephalographySignalClassification based on Sub-Band Common Spatial P...
ย 
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design SystemIC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
IC Layout Design of 4-bit Magnitude Comparator using Electric VLSI Design System
ย 
Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...Design & Implementation of Subthreshold Memory Cell design based on the prima...
Design & Implementation of Subthreshold Memory Cell design based on the prima...
ย 
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography ImagesRetinal Macular Edema Detection Using Optical Coherence Tomography Images
Retinal Macular Edema Detection Using Optical Coherence Tomography Images
ย 
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral SubtractionSpeech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
Speech Enhancement Using Spectral Flatness Measure Based Spectral Subtraction
ย 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
ย 
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
Performance Analysis of the Sigmoid and Fibonacci Activation Functions in NGA...
ย 

Kรผrzlich hochgeladen

Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Call Girls in Nagpur High Profile
ย 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
ย 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
ย 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
ย 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
ย 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”soniya singh
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
ย 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
ย 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
ย 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
ย 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
ย 

Kรผrzlich hochgeladen (20)

Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth โŸŸ 6297143586 โŸŸ Call Me For Genuine Se...
ย 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
ย 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
ย 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
ย 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
ย 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
ย 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ย 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
ย 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
ย 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
ย 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
ย 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
ย 
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
Model Call Girl in Narela Delhi reach out to us at ๐Ÿ”8264348440๐Ÿ”
ย 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
ย 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
ย 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
ย 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
ย 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
ย 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
ย 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
ย 

A Hybrid Steganography Technique Based On LSBMR And OPAP

  • 1. IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 7, Issue 1, Ver. I (Jan. - Feb. 2017), PP 33-37 e-ISSN: 2319 โ€“ 4200, p-ISSN No. : 2319 โ€“ 4197 www.iosrjournals.org DOI: 10.9790/4200-0701013337 www.iosrjournals.org 33 | Page A Hybrid Steganography Technique Based On LSBMR And OPAP Varun sangwan Sangwan.varun@gmail.com Abstract: This paper presents a steganography technique based on two existing methods of data hiding i.e. LSBMR and OPAP. The proposed method uses the non-overlapping blocks, having three consecutive pixels. The center pixel of this block embeds k- bits of secret data using OPAP and the remaining pixels of the block embed data using LSBMR. The experimental results show that the proposed method provides better embedding capacity while maintaining the good image quality. The improved performance is shown in comparison to other data hiding methods that are investigated in this study. Keywords: steganography, imperceptibility, least-significant-bit matching revisited (LSBMR), Optimal-pixel- adjustment process (OPAP). I. Introduction The Internet has emerged as a powerful tool for communication over the past decade. It has provided an open and connected environment to its users. Communicating over the Internet is fast and hassle-free but there are few risks attached with it, which cannot be ignored. The biggest nightmare that surrounds the Internet today is privacy. Privacy may be compromised whenever some confidential information is transferred from one person to the other over this open network. To resolve this issue there is a need of a technique through which the information can be transferred secretly. Secure communication between two entities is when the information is transferred in a way that is insusceptible to eavesdropping. Various information hiding techniques are available that facilitate two parties to communicate in secret. Steganography is one such branch of data hiding. The primary goal of steganography is to conceal the message being communicated within some cover media. The digital cover media used for this purpose can be an image, audio, video, text etc [1]. Digital images are widely used in steganography in comparison to other available cover media due to their high abundance on the Internet. In this paper, the cover media used is an image and the secret data used in the form of text. Steganography can be performed in various domains but the spatial domain techniques are more popular than others due to their simplicity and less time complexity. In this paper, one such spatial time domain technique has been proposed. The spatial domain methods can be divided into three categories: (i) high embedding capacity approaches with acceptable image quality, (ii) high image quality approaches with reasonable hiding capacity and (iii) restricted embedding capacity approaches with a slight distortion in the quality of the image. First category of spatial domain approaches focuses on increasing the embedding capacity of cover media [2]. Well-known least-significant-bit (LSB) substitution method lies under this category. In this method, k-LSB bits are replaced with secret data bits. Second category of spatial domain approaches consists of adaptive steganographic methods which makes use of the properties of human visual system (HVS) i.e. hiding more data in edge areas and less data in smooth areas. The third category of spatial domain approaches provides restricted embedding capacity while maintaining high robustness against steganalysis attacks. One such technique is LSBMR that keeps the cover media unchanged and therefore, less susceptible to attacks. This paper, focuses on second category methods and proposes a new steganographic algorithm that makes use of LSBMR [3] and OPAP [2] to embed secret data into grayscale cover images. This method consists of two stages. In first stage, the cover image is partitioned into blocks of three consecutive pixels. The center pixel is embedded with k-bits of secret data using LSB substitution and is adjusted accordingly by OPAP for data recovery on the other side. The other two pixels are embedded with one bit each using LSBMR. In the second stage, the data is extracted from stego image. The remaining sections of the paper is organised as follows. In section II, the literature review is described. In Section III, the proposed method is presented. In section IV, several experimental results are presented to demonstrate the performance of proposed scheme. Finally, conclusions are given in Section V.
  • 2. A hybrid steganography technique based on LSBMR and OPAP DOI: 10.9790/4200-0701013337 www.iosrjournals.org 34 | Page II. Literature Review 2.1 PVD method In 2003, Wu and Tsai used basic property of HVS system and presented a steganography method using PVD [4]. This method hides different amount of secret bits in consecutive non-overlapping pixel pairs by taking the difference value between the pixels of a pixel pair. This method partitions the given cover image into non- overlappings blocks with two consecutive pixels, say ๐‘๐‘– and ๐‘๐‘–+1 .Wu and Tsai designed a range table ๐‘…๐‘— with ranges varying from 0 to 255. The range table ๐‘…๐‘— has six ranges as ๐‘…1=[0,7], ๐‘…2=[8,15], ๐‘…3=[16,31], ๐‘…4=[32,63], ๐‘…5=[64,127] and ๐‘…6=[128,255]. The lower bound and upper bound value of each range is given by ๐‘™๐‘— and ๐‘ข๐‘— . Also, the width of each range is given by ๐‘…๐‘— =๐‘ข๐‘— โˆ’ ๐‘™๐‘— + 1. The method of hiding secret data into the non-overlapping blocks is as follows: 1. Calculate the difference value between the two pixels of each block, ๐‘‘๐‘– = ๐‘๐‘– โˆ’ ๐‘๐‘–+1 . 2. Find the range to which the above calculated ๐‘‘๐‘– belongs to. 3. Compute how many bits of secret data can be embedded in each block of pixel pair, ๐‘ก๐‘— = ๐‘™๐‘œ๐‘”2 ๐‘…๐‘— . 4. Read ๐‘ก๐‘— bits from the binary secret data stream and covert into a decimal value ๐‘ ๐‘–. 5. Calculate the new difference value, ๐‘‘๐‘– โ€ฒ = ๐‘™๐‘— + ๐‘ ๐‘–. 6. Modify the pixels ๐‘๐‘– and ๐‘๐‘–+1 as, ๐‘๐‘– โ€ฒ , ๐‘๐‘–+1 โ€ฒ = ๐‘๐‘– + ๐‘ง 2 , ๐‘๐‘–+1 โˆ’ ๐‘ง 2 ๐‘–๐‘“ ๐‘๐‘– โ‰ฅ ๐‘๐‘–+1 ๐‘Ž๐‘›๐‘‘ ๐‘‘๐‘– โ€ฒ > ๐‘‘๐‘– ๐‘๐‘– โˆ’ ๐‘ง 2 , ๐‘๐‘–+1 + ๐‘ง 2 ๐‘–๐‘“ ๐‘๐‘– < ๐‘๐‘–+1 ๐‘Ž๐‘›๐‘‘ ๐‘‘๐‘– โ€ฒ > ๐‘‘๐‘– ๐‘๐‘– โˆ’ ๐‘ง 2 , ๐‘๐‘–+1 + ๐‘ง 2 ๐‘–๐‘“ ๐‘๐‘– โ‰ฅ ๐‘๐‘–+1 ๐‘Ž๐‘›๐‘‘ ๐‘‘๐‘– โ€ฒ โ‰ค ๐‘‘๐‘– ๐‘๐‘– + ๐‘ง 2 , ๐‘๐‘–+1 โˆ’ ๐‘ง 2 ๐‘–๐‘“ ๐‘๐‘– < ๐‘๐‘–+1 ๐‘Ž๐‘›๐‘‘ ๐‘‘๐‘– โ€ฒ โ‰ค ๐‘‘๐‘– (1) where ๐‘ง = ๐‘‘๐‘– โˆ’ ๐‘‘๐‘– โ€ฒ . This process is repeated for each of the block to obtain the stego image. 2.2 PVD and LSB replacement method In 2005, Wu et al. proposed a steganographic method inspired by PVD technique [5]. This method partitions the given cover image into non-overlappings blocks with two consecutive pixels, say ๐‘๐‘– and ๐‘๐‘–+1. Here, the range table ๐‘…๐‘— with ranges varying from 0 to 255 is divided into โ€žlower levelโ€Ÿ and โ€žhigher levelโ€Ÿ. In case of div=15, lower level contains ranges ๐‘…1 =[0,7] and ๐‘…2 =[8,15] while higher level contains ranges ๐‘…3 =[16,31], ๐‘…4=[32,63], ๐‘…5=[64,127] and ๐‘…6=[128,255]. The lower bound and upper bound value of each range is given by ๐‘™๐‘— and ๐‘ข๐‘— . Also, the width of each range is given by ๐‘…๐‘— =๐‘ข๐‘— โˆ’ ๐‘™๐‘— + 1. Now, for each block difference value is calculated as, ๐‘‘๐‘– = ๐‘๐‘– โˆ’ ๐‘๐‘–+1 . Case I: If the difference value ๐‘‘๐‘–falls in the range of lower level, then LSB substitution method is used to embed 6- bits of secret data. The procedure is as follows: Let the 6-bits secret data is S=๐‘Ž1, ๐‘Ž2, ๐‘Ž3, ๐‘Ž4, ๐‘Ž5, ๐‘Ž6. 1. Replace 3-LSB of ๐‘๐‘– with ๐‘Ž1, ๐‘Ž2, ๐‘Ž3 to obtain ๐‘๐‘– โ€ฒ . 2. Replace 3-LSB of ๐‘๐‘–+1 with ๐‘Ž4, ๐‘Ž5, ๐‘Ž6 to obtain ๐‘๐‘–+1 โ€ฒ . 3. Calculate the new difference value ๐‘‘๐‘– โ€ฒ = ๐‘๐‘– โ€ฒ โˆ’ ๐‘๐‘–+1 โ€ฒ . 4. If the new difference value falls in the higher level, then perform the readjusting operation. ๐‘๐‘– โ€ฒ , ๐‘๐‘–+1 โ€ฒ = ๐‘๐‘– โ€ฒ โˆ’ 8, ๐‘๐‘–+1 โ€ฒ + 8 ๐‘–๐‘“ ๐‘๐‘– โ€ฒ โ‰ฅ ๐‘๐‘–+1 โ€ฒ ๐‘๐‘– โ€ฒ + 8, ๐‘๐‘–+1 โ€ฒ โˆ’ 8 ๐‘–๐‘“ ๐‘๐‘– โ€ฒ < ๐‘๐‘–+1 โ€ฒ (2) Case II: If the difference value ๐‘‘๐‘– falls in the higher level range then PVD method is used to embed secret data bits in pixel pairs. III. Proposed work This section describes the proposed steganographic method for greyscale cover images. The method consists of two phases: (i) embedding phase and (ii) extracting phase. 3.1 Embedding phase First the cover image is partitioned into non-overlapping blocks in raster scan manner. Each block has three consecutive pixels in which the center pixel is named as ๐‘๐‘–๐‘ and the first and third pixels are ๐‘๐‘–1 and ๐‘๐‘–2. The procedure of embedding data is as follows [6]: 1. Consider the k-LSBs of ๐‘๐‘–๐‘ where k โˆˆ{3,4,5,6} and transform them into a decimal value ๐ฟ๐‘†๐ต๐‘–.
  • 3. A hybrid steganography technique based on LSBMR and OPAP DOI: 10.9790/4200-0701013337 www.iosrjournals.org 35 | Page 2. Read k-bits of secret data (i.e. k โˆˆ{3,4,5,6}) and replace the k-LSBs of ๐‘๐‘–๐‘ with these k-bits of secret data to obtain๐‘๐‘–๐‘ โ€ฒ . Also, covert the k-secret data bits into decimal equivalent, say ๐‘ ๐‘–๐‘ . 3. Compute the difference value, d=๐ฟ๐‘†๐ต๐‘– โˆ’ ๐‘ ๐‘–๐‘ . 4. Using OPAP modify the value of ๐‘๐‘–๐‘โ€ฒ as follows: ๐‘๐‘–๐‘ โ€ฒ = ๐‘๐‘–๐‘ โ€ฒ + 2 ๐‘˜ ๐‘–๐‘“ ๐‘‘ > 2 ๐‘˜โˆ’1 ๐‘Ž๐‘›๐‘‘ 0 โ‰ค ๐‘๐‘–๐‘ โ€ฒ + 2 ๐‘˜ โ‰ค 255 ๐‘๐‘–๐‘ โ€ฒ โˆ’ 2 ๐‘˜ ๐‘–๐‘“ ๐‘‘ < โˆ’2 ๐‘˜โˆ’1 ๐‘Ž๐‘›๐‘‘ 0 โ‰ค ๐‘๐‘–๐‘ โ€ฒ โˆ’ 2 ๐‘˜ โ‰ค 255 ๐‘๐‘–๐‘ โ€ฒ ๐‘œ๐‘ก ๐‘• ๐‘’๐‘Ÿ๐‘ค๐‘–๐‘ ๐‘’ (3) 5. For data hiding in first and third pixel follow the four cases: Case I: LSB(๐‘๐‘–1) = ๐‘ ๐‘–1& ๐‘“ ๐‘๐‘–1, ๐‘๐‘–2 = ๐‘ ๐‘–2 ๐‘๐‘–1 โ€ฒ , ๐‘๐‘–2 โ€ฒ = (๐‘๐‘–1, ๐‘๐‘–2) Case II: LSB(๐‘๐‘–1) = ๐‘ ๐‘–1& ๐‘“ ๐‘๐‘–1, ๐‘๐‘–2 โ‰  ๐‘ ๐‘–2 ๐‘๐‘–1 โ€ฒ , ๐‘๐‘–2 โ€ฒ = (๐‘๐‘–1, ๐‘๐‘–2 ยฑ 1) Case III: LSB(๐‘๐‘–1) โ‰  ๐‘ ๐‘–1& ๐‘“ ๐‘๐‘–1 โˆ’ 1, ๐‘๐‘–2 = ๐‘ ๐‘–2 ๐‘๐‘–1 โ€ฒ , ๐‘๐‘–2 โ€ฒ = (๐‘๐‘–1 โˆ’ 1, ๐‘๐‘–2) Case IV: LSB(๐‘๐‘–1) โ‰  ๐‘ ๐‘–1& ๐‘“ ๐‘๐‘–1 โˆ’ 1, ๐‘๐‘–2 โ‰  ๐‘ ๐‘–2 ๐‘๐‘–1 โ€ฒ , ๐‘๐‘–2 โ€ฒ = (๐‘๐‘–1 + 1, ๐‘๐‘–2) where ๐‘“ ๐‘๐‘–1, ๐‘๐‘–2 = ๐ฟ๐‘†๐ต( ๐‘ ๐‘–1 2 + ๐‘๐‘–2) and ๐‘ ๐‘–1, ๐‘ ๐‘–2denote two secret bits to be embedded. After embedding process new block will have pixels ๐‘๐‘–1 โ€ฒ , ๐‘๐‘–๐‘ โ€ฒ , ๐‘๐‘–2 โ€ฒ . The above procedure will be repeated for each block of cover image to obtain the stego image. 3.2 Extracting phase In this section the embedded data is recovered from stego image. The stego image is partitioned into non- overlapping blocks of three pixels each. Then select the second pixel of the block first and perform the extraction process as follows: 1. Extract the secret data bits from k-LSBs of ๐‘๐‘–๐‘ โ€ฒ and call it ๐‘ ๐‘–๐‘ . 2. Obtain ๐‘ ๐‘–1 and ๐‘ ๐‘–2 using the relation, ๐‘ ๐‘–1 = ๐ฟ๐‘†๐ต(๐‘๐‘–1 โ€ฒ ) ๐‘ ๐‘–2 = ๐‘“(๐‘๐‘–1 โ€ฒ , ๐‘๐‘–2 โ€ฒ ) Concatenate ๐‘ ๐‘–๐‘ ,๐‘ ๐‘–1 and ๐‘ ๐‘–2 to obtain the original secret data bit stream. Apply the above procedure on each block to extract the whole secret data bits. IV. Experimental Results This section presents the experimental results of the proposed method and compares the results with the results of PVD method and PVD &LSB replacement method. The test images used for verifying the results are greyscale images of size 512X512, namely โ€žLenaโ€Ÿ, โ€žPeppersโ€Ÿ, โ€žBaboonโ€Ÿ and โ€žBoatโ€Ÿ. Generally, for performance evaluation of data hiding methods, four criteria are utilized [7]: (i) imperceptibility of stego images, (ii) the embedding capacity, (iii) the complexity and (iv) the robustness of data embedding algorithm. The proposed method tries to satisfy these criteria satisfactorily. The PSNR value is used to evaluate the distortions of the stego images [8]. It can be computed as ๐‘€๐‘†๐ธ = 1 ๐‘€ร—๐‘ 2 1 1 ( ( , ) ( , )) M N i j I i j Y i j ๏€ฝ ๏€ฝ ๏€ญ๏ƒฅ๏ƒฅ (4) ๐‘ƒ๐‘†๐‘๐‘… = 10๐‘™๐‘œ๐‘”10 ๐‘€๐‘Ž๐‘ฅ 2 ๐‘€๐‘†๐ธ (5) where MxN denotes the size of the cover image I and stego image Y. a high PSNR value means good quality of stego image and is highly imperceptible whereas a low PSNR means the opposite. Fig. 1. shows the similarity between cover images and its corresponding stego images and hence proves the proposed method is highly imperceptible.
  • 4. A hybrid steganography technique based on LSBMR and OPAP DOI: 10.9790/4200-0701013337 www.iosrjournals.org 36 | Page Table 1. Comparisons of the results between PVD, PVD & LSB replacement and the Proposed method. The embedding capacity of the proposed method increases as the k value increases whereas the PSNR value decreases. The distortions occurred due to increase in embedding capacity are slight and indistinguishable. Table 1 shows the comparison of PSNR values and embedding capacity of the proposed method with the PVD and PVD&LSB replacement methods. Here, the proposed method performs better than the PVD method in both criteria whereas its better than second method in PSNR value and not in terms of embedding capacity. Generally, the methods designed in spatial domain have a low time complexity. The proposed method falls under spatial domain and also, in this method there is no requirement of readjusting phase or knowledge of any range table as required by PVD and PVD &LSB replacement methods. Thus, the time complexity of the proposed method is low. (a) (b) Fig. 2. (a) standard cover images (b) stego images embedded with data using proposed method.
  • 5. A hybrid steganography technique based on LSBMR and OPAP DOI: 10.9790/4200-0701013337 www.iosrjournals.org 37 | Page Besides providing large data hiding capacity and good quality of stego image, a steganographic method needs to be resistant against various steganalytic attacks [9],[10]. Mostly the steganalysers are based on image histogram, therefore, if the histogram characteristics are preserved properly then there is possibility of achieving high resistance against the well-known detectors. The proposed method maintains less changes in histogram as the PSNR value is good and the stego image is imperceptible. V. Conclusions This paper has presented a hybrid steganographic technique based on LSMR and OPAP. This method can hide large amount of secret data as well as provide an imperceptible stego image quality while compensating for the dissimilarity between the histograms of the cover and stego images.. The efficacy of the proposed method is verified via several experimental results that yielded better performance in comparison with PVD and PVD-LSB replacement method. References [1] F. Petitcolas, R. Anderson, and M. Kuhn, โ€œInformation hiding- a survey,โ€ Proc. IEEE, vol. 87, iss. 7, pp. 1062-1078, 1999. [2] C.K. Chan, L.M. Cheng, โ€œHiding data in image by simple LSB substitutionโ€, pattern recognition, vol. 37, no. 3, 2004, pp. 469-474. [3] J. Mielikainen, โ€œLSB matching revisited,โ€ IEEE Signal Process. Lett., vol. 13, no. 5, 2006, pp. 285-287. [4] D. C. Wu and W. H. Tsai, โ€œA steganographic method for images by pixel-value-differencing,โ€ Pattern Recognit. Lett., vol. 24, no. 9-10, pp. 1613-1626, 2003. [5] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, โ€œImage steganographic scheme based on pixel-value-differencing and LSB replacement methods,โ€ Proc. Inst. Elect. Eng.,Vis. Images Signal Process., vol. 152, no. 5, pp. 611-615, 2005. [6] C. M. Wang, N. I. Wu, C. S. Tsai, and M. S. Hwang, โ€œ A high quality steganographic method with pixel value differencing and modulus function,โ€ The Journal of Sys.and Soft., vol.81, pp. 150-158, 2008. [7] C.-H. Yang, C.-Y. Weng, S.-J. Wang and H.-M. Sun, โ€œAdaptive data hiding in edge areas of images with spatial LSB domain systems,โ€ IEEE Trans. Inf. Forensics Sec., vol. 3, no. 3, pp. 488-497, 2008. [8] M. Khodaei and K. Faez, โ€œNew adaptive steganographic method using least-significant-bit substitution and pixel-value differencing,โ€ IET Image Processing, vol. 6, iss. 6, pp. 677-686, 2012. [9] J. Fridrich, M. Goljan, and R. Du, โ€œRelaiable detection of LSB steganography in color and grayscale images,โ€ Proc. ACM Workshop on Multi. And Sec., pp. 61-75, 2000. [10] A. Westfeld, A. Pfitzmann, โ€œAttacks on stegographic systemsโ€, Lecture Notes in Computer Science, vol. 1768, 2000, pp. 61-75. [11] The USC-SIPI Image Database, http://sipi.usc.edu/database. [12] Amit bhanwala, Mayank kumar, yogendra Kumar,โ€ FPGA based Design of Low Power Reconfigurable Router for Network on Chip (NoC)โ€, ISBN:978-1-4799-8890 ยฉ2015 IEEE,International Conference on Computing, Communication and Automation (ICCCA2015), pp- 1320 - 1326, DOI: 10.1109/CCAA.2015.7148581. [13] Mayank kumar, Kishore kumar, sanjiv kumar gupta, yogendra Kumar,โ€ FPGA based Design of Area efficient router Architecture for Network on Chip (NoC)โ€, IEEE,International Conference on Computing, Communication and Automation (ICCCA2016), pp-1600 - 1605, DOI: 10.1109/CCAA.2016.7813980.