SlideShare a Scribd company logo
1 of 8
A Novel Data Embedding Method Using Adaptive Pixel Pair
                                  Matching


ABSTRACT:

This paper proposes a new data-hiding method based on pixel pair matching
(PPM). The basic idea of PPM is to use the values of pixel pair as a reference
coordinate, and search a coordinate in the neighborhood set of this pixel pair
according to a given message digit. The pixel pair is then replaced by the searched
coordinate to conceal the digit. Exploiting modification direction (EMD) and
diamond encoding (DE) are two data-hiding methods proposed recently based on
PPM. The maximum capacity of EMD is 1.161 bpp and DE extends the payload of
EMD by embedding digits in a larger notational system. The proposed method
offers lower distortion than DE by providing more compact neighborhood sets and
allowing embedded digits in any notational system. Compared with the optimal
pixel adjustment process (OPAP) method, the proposed method always has lower
distortion for various payloads. Experimental results reveal that the proposed
method not only provides better performance than those of OPAP and DE, but also
is secure under the detection of some well-known steganalysis techniques.
SYSTEM ACHITECTURE:

                    SENDER




  Login              Login
  Details




                     Cover            SECRET          Adaptive
                                                       Pixel Pair      Stego image
                     image             DATA
                                                      Matching




                                                            Cover
                                        SECRET                           RECEIVER
                                                            image
                                         DATA




EXISTING SYSTEM:

The least significant bit substitution method, referred to as LSB in this paper, is a
well-known data-hiding method. This method is easy to implement with low CPU
cost, and has become one of the popular embedding techniques. However, in LSB
embedding, the pixels with even values will be increased by one or kept
unmodified. The pixels with odd values will be decreased by one or kept
unmodified. Therefore, the imbalanced embedding distortion emerges and is
vulnerable to steganalysis.


Optimal pixel adjustment process (OPAP) method to reduce the distortion caused
by LSB replacement. In their method, if message bits are embedded into the right-
most LSBs of an -bit pixel, other bits are adjusted by a simple evaluation. Namely,
if the adjusted result offers a smaller distortion, these bits are either replaced by the
adjusted result or otherwise kept unmodified.


Exploiting modification direction (EMD) and diamond encoding (DE) are two
data-hiding methods proposed recently based on PPM


DISADVANTAGES OF EXISTING SYSTEM:

      Imbalanced embedding distortion emerges and is vulnerable to steganalysis.


      The existing technique can be easily cracked.
PROPOSED SYSTEM:

The basic idea of PPM is to use the values of pixel pair as a reference coordinate,
and search a coordinate in the neighborhood set of this pixel pair according to a
given message digit. The pixel pair is then replaced by the searched coordinate to
conceal the digit.


This paper proposes a new data embedding method to reduce the embedding
impact by providing a simple extraction function and a more compact
neighborhood set. The proposed method embeds more messages per modification
and thus increases the embedding efficiency. The image quality obtained by the
proposed method not only performs better than those obtained by OPAP and DE,
but also brings higher payload with less detect ability. Moreover, the best
notational system for data concealing can be determined and employed in this new
method according to the given payload so that a lower image distortion can be
achieved.



ADVANTAGES OF PROPOSED SYSTEM:

The proposed method offers lower distortion than DE by providing more compact
neighborhood sets and allowing embedded digits in any notational system.
Compared with the optimal pixel adjustment process (OPAP) method, the
proposed method always has lower distortion for various payloads. Experimental
results reveal that the proposed method not only provides better performance than
those of OPAP and DE, but also is secure under the detection of some well-known
steganalysis techniques.



MODULES:

      Extraction Function and Neighborhood Set
      Embedding Procedure
      Extraction Procedure
      Statistical Analysis of the Histogram Differences




MODULES DESCRIPTION:



Extraction Function and Neighborhood Set

In this module we perform the action of extraction function and neighborhood set.
Where the system does a new data embedding method to reduce the embedding
impact by providing a simple extraction function and a more compact
neighborhood set. The proposed method embeds more messages per modification
and thus increases the embedding efficiency. The image quality obtained by the
proposed method not only performs better than those obtained by OPAP and DE,
but also brings higher payload with less detectability. Moreover, the best notational
system for data concealing can be determined and employed in this new method
according to the given payload so that a lower image distortion can be achieved.



Embedding Procedure

Input: Cover image of size , secret bit stream, and key .
Output: Stego image , , , and .


1. Find the minimum satisfying, and convert into a list of digits with a -ary
notational system.
2. Solve the discrete optimization problem to find and.
3. In the region defined by, record the coordinate such that , .
4. Construct a no repeat random embedding sequence using a key .
5. To embed a message digit, two pixels in the cover image are selected according
to the embedding sequence, and calculate the modulus distance between and , then
replace with .
6. Repeat Step 5 until all the message digits are embedded.

Extraction Procedure

To extract the embedded message digits, pixel pairs are scanned in the same order
as in the embedding procedure. The embedded message digits are the values of
extraction function of the scanned pixel pairs.
Input: Stego image, , , and .
Output: Secret bit stream.
1. Construct the embedding sequence using the key.
2. Select two pixels according to the embedding sequence.
3. Calculate, the result is the embedded digit.
4. Repeat Steps 2 and 3 until all the message digits are extracted.
5. Finally, the message bits can be obtained by converting the extracted message
digits into a binary bit stream.


Statistical Analysis of the Histogram Differences
In this module, we perform the goal of system analysis by using histogram
technique. The goal of steganography is to evade statistical detection. It is apparent
that MSE is not a good measure of security against the detection of steganalysis.
Histograms are used to plot density of data, and often for density estimation:
estimating the probability density function of the underlying variable. The total
area of a histogram used for probability density is always normalized to 1. If the
lengths of the intervals on the x-axis are all 1, then a histogram is identical to a
relative frequency plot.


HARDWARE REQUIREMENTS
             •      SYSTEM              : Pentium IV 2.4 GHz
•    HARD DISK        : 40 GB
          •    MONITOR          : 15 VGA colour
          •    MOUSE            : Logitech.
          •    RAM              : 256 MB
          •    KEYBOARD         : 110 keys enhanced.



SOFTWARE REQUIREMENTS
          •    Operating system :     Windows XP Professional
          •    Front End        :     JAVA
          •    Tool             :     NETBEANS IDE



REFERENCE:

Wien Hong and Tung-Shou Chen, “A Novel Data Embedding Method Using
Adaptive Pixel Pair Matching” , IEEE TRANSACTIONS ON INFORMATION
FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012.

More Related Content

What's hot

Handwritten and Machine Printed Text Separation in Document Images using the ...
Handwritten and Machine Printed Text Separation in Document Images using the ...Handwritten and Machine Printed Text Separation in Document Images using the ...
Handwritten and Machine Printed Text Separation in Document Images using the ...Konstantinos Zagoris
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryptionvaishali kataria
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 
On Text Realization Image Steganography
On Text Realization Image SteganographyOn Text Realization Image Steganography
On Text Realization Image SteganographyCSCJournals
 
Adaptive data hiding in edge areas of images with spatial lsb domain systems
Adaptive data hiding in edge areas of images with spatial lsb domain systemsAdaptive data hiding in edge areas of images with spatial lsb domain systems
Adaptive data hiding in edge areas of images with spatial lsb domain systemsAmmory Ali
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
A novel data embedding method using adaptive pixel
A novel data embedding method using adaptive pixelA novel data embedding method using adaptive pixel
A novel data embedding method using adaptive pixelRenuka Verma
 

What's hot (20)

M017427985
M017427985M017427985
M017427985
 
Lecture1
Lecture1Lecture1
Lecture1
 
G017444651
G017444651G017444651
G017444651
 
Handwritten and Machine Printed Text Separation in Document Images using the ...
Handwritten and Machine Printed Text Separation in Document Images using the ...Handwritten and Machine Printed Text Separation in Document Images using the ...
Handwritten and Machine Printed Text Separation in Document Images using the ...
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
I017425763
I017425763I017425763
I017425763
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
 
Image Steganography With Encryption
Image Steganography With EncryptionImage Steganography With Encryption
Image Steganography With Encryption
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
On Text Realization Image Steganography
On Text Realization Image SteganographyOn Text Realization Image Steganography
On Text Realization Image Steganography
 
G0210032039
G0210032039G0210032039
G0210032039
 
Adaptive data hiding in edge areas of images with spatial lsb domain systems
Adaptive data hiding in edge areas of images with spatial lsb domain systemsAdaptive data hiding in edge areas of images with spatial lsb domain systems
Adaptive data hiding in edge areas of images with spatial lsb domain systems
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
Project presentation
Project presentationProject presentation
Project presentation
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Image compression using EZW encoding
Image compression using EZW encoding Image compression using EZW encoding
Image compression using EZW encoding
 
A novel data embedding method using adaptive pixel
A novel data embedding method using adaptive pixelA novel data embedding method using adaptive pixel
A novel data embedding method using adaptive pixel
 

Viewers also liked

Cloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvCloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvJPINFOTECH JAYAPRAKASH
 
Social tube p2p assisted video sharing inonline social networks
Social tube p2p assisted video sharing inonline social networksSocial tube p2p assisted video sharing inonline social networks
Social tube p2p assisted video sharing inonline social networksJPINFOTECH JAYAPRAKASH
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsJPINFOTECH JAYAPRAKASH
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
A distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksA distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksJPINFOTECH JAYAPRAKASH
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
 
A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...JPINFOTECH JAYAPRAKASH
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksJPINFOTECH JAYAPRAKASH
 
2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotechJPINFOTECH JAYAPRAKASH
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingJPINFOTECH JAYAPRAKASH
 
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesDistributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesJPINFOTECH JAYAPRAKASH
 

Viewers also liked (16)

2015 2016 ieee java project titles
2015 2016 ieee java project titles2015 2016 ieee java project titles
2015 2016 ieee java project titles
 
Twitsper tweeting privately
Twitsper tweeting privatelyTwitsper tweeting privately
Twitsper tweeting privately
 
Cloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvCloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tv
 
Social tube p2p assisted video sharing inonline social networks
Social tube p2p assisted video sharing inonline social networksSocial tube p2p assisted video sharing inonline social networks
Social tube p2p assisted video sharing inonline social networks
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
2012-2013 IEEE JAVA PROJECT TITLES
2012-2013 IEEE JAVA PROJECT TITLES2012-2013 IEEE JAVA PROJECT TITLES
2012-2013 IEEE JAVA PROJECT TITLES
 
Whole test suite generation
Whole test suite generationWhole test suite generation
Whole test suite generation
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
A distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksA distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networks
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networks
 
2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwarding
 
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesDistributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
 

Similar to A novel data embedding method using adaptive pixel pair matching

Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystManish Myst
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Imagesijsrd.com
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
 
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...chennaijp
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
SasuriE ajal
SasuriE ajalSasuriE ajal
SasuriE ajalAJAL A J
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 

Similar to A novel data embedding method using adaptive pixel pair matching (20)

Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
Av4102350358
Av4102350358Av4102350358
Av4102350358
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
A Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital ImagesA Survey of different Data Hiding Techniques in Digital Images
A Survey of different Data Hiding Techniques in Digital Images
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
 
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...JPM1406  Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
JPM1406 Dual-Geometric Neighbor Embedding for Image Super Resolution With Sp...
 
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
SasuriE ajal
SasuriE ajalSasuriE ajal
SasuriE ajal
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
review.pptx
review.pptxreview.pptx
review.pptx
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 

Recently uploaded

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 

Recently uploaded (20)

Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

A novel data embedding method using adaptive pixel pair matching

  • 1. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching ABSTRACT: This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM. The maximum capacity of EMD is 1.161 bpp and DE extends the payload of EMD by embedding digits in a larger notational system. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits in any notational system. Compared with the optimal pixel adjustment process (OPAP) method, the proposed method always has lower distortion for various payloads. Experimental results reveal that the proposed method not only provides better performance than those of OPAP and DE, but also is secure under the detection of some well-known steganalysis techniques.
  • 2. SYSTEM ACHITECTURE: SENDER Login Login Details Cover SECRET Adaptive Pixel Pair Stego image image DATA Matching Cover SECRET RECEIVER image DATA EXISTING SYSTEM: The least significant bit substitution method, referred to as LSB in this paper, is a well-known data-hiding method. This method is easy to implement with low CPU
  • 3. cost, and has become one of the popular embedding techniques. However, in LSB embedding, the pixels with even values will be increased by one or kept unmodified. The pixels with odd values will be decreased by one or kept unmodified. Therefore, the imbalanced embedding distortion emerges and is vulnerable to steganalysis. Optimal pixel adjustment process (OPAP) method to reduce the distortion caused by LSB replacement. In their method, if message bits are embedded into the right- most LSBs of an -bit pixel, other bits are adjusted by a simple evaluation. Namely, if the adjusted result offers a smaller distortion, these bits are either replaced by the adjusted result or otherwise kept unmodified. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM DISADVANTAGES OF EXISTING SYSTEM: Imbalanced embedding distortion emerges and is vulnerable to steganalysis. The existing technique can be easily cracked.
  • 4. PROPOSED SYSTEM: The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. This paper proposes a new data embedding method to reduce the embedding impact by providing a simple extraction function and a more compact neighborhood set. The proposed method embeds more messages per modification and thus increases the embedding efficiency. The image quality obtained by the proposed method not only performs better than those obtained by OPAP and DE, but also brings higher payload with less detect ability. Moreover, the best notational system for data concealing can be determined and employed in this new method according to the given payload so that a lower image distortion can be achieved. ADVANTAGES OF PROPOSED SYSTEM: The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits in any notational system. Compared with the optimal pixel adjustment process (OPAP) method, the proposed method always has lower distortion for various payloads. Experimental
  • 5. results reveal that the proposed method not only provides better performance than those of OPAP and DE, but also is secure under the detection of some well-known steganalysis techniques. MODULES: Extraction Function and Neighborhood Set Embedding Procedure Extraction Procedure Statistical Analysis of the Histogram Differences MODULES DESCRIPTION: Extraction Function and Neighborhood Set In this module we perform the action of extraction function and neighborhood set. Where the system does a new data embedding method to reduce the embedding impact by providing a simple extraction function and a more compact neighborhood set. The proposed method embeds more messages per modification and thus increases the embedding efficiency. The image quality obtained by the proposed method not only performs better than those obtained by OPAP and DE,
  • 6. but also brings higher payload with less detectability. Moreover, the best notational system for data concealing can be determined and employed in this new method according to the given payload so that a lower image distortion can be achieved. Embedding Procedure Input: Cover image of size , secret bit stream, and key . Output: Stego image , , , and . 1. Find the minimum satisfying, and convert into a list of digits with a -ary notational system. 2. Solve the discrete optimization problem to find and. 3. In the region defined by, record the coordinate such that , . 4. Construct a no repeat random embedding sequence using a key . 5. To embed a message digit, two pixels in the cover image are selected according to the embedding sequence, and calculate the modulus distance between and , then replace with . 6. Repeat Step 5 until all the message digits are embedded. Extraction Procedure To extract the embedded message digits, pixel pairs are scanned in the same order as in the embedding procedure. The embedded message digits are the values of extraction function of the scanned pixel pairs.
  • 7. Input: Stego image, , , and . Output: Secret bit stream. 1. Construct the embedding sequence using the key. 2. Select two pixels according to the embedding sequence. 3. Calculate, the result is the embedded digit. 4. Repeat Steps 2 and 3 until all the message digits are extracted. 5. Finally, the message bits can be obtained by converting the extracted message digits into a binary bit stream. Statistical Analysis of the Histogram Differences In this module, we perform the goal of system analysis by using histogram technique. The goal of steganography is to evade statistical detection. It is apparent that MSE is not a good measure of security against the detection of steganalysis. Histograms are used to plot density of data, and often for density estimation: estimating the probability density function of the underlying variable. The total area of a histogram used for probability density is always normalized to 1. If the lengths of the intervals on the x-axis are all 1, then a histogram is identical to a relative frequency plot. HARDWARE REQUIREMENTS • SYSTEM : Pentium IV 2.4 GHz
  • 8. HARD DISK : 40 GB • MONITOR : 15 VGA colour • MOUSE : Logitech. • RAM : 256 MB • KEYBOARD : 110 keys enhanced. SOFTWARE REQUIREMENTS • Operating system : Windows XP Professional • Front End : JAVA • Tool : NETBEANS IDE REFERENCE: Wien Hong and Tung-Shou Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching” , IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 7, NO. 1, FEBRUARY 2012.