Professional Documents
Culture Documents
m
m
m
i Introduction of Steganography
i Different types
i Image stegnography
i Stegnography system
i Data hiding properties
i Previous methods & its drawbacks
i Adaptive LSB substitution method
i Experimental results
i Applications
i Conclusion
i covered from the Greek ³stegos´
i
! writing from the Greek ³graphia
i It is the most widely used medium.
i Imperceptibility
i
0
In this method the LSB of the cover image is directly replaced
by the secret bit to get a stego image.
i "
Modifies the LSBs of the cover image for data hiding
i #$
"
It provides good imperceptibility by calculating the difference
of two consecutive pixels to determine the depth of the
embedded bits .
i Some simple LSB approaches equally change the LSBs of all
the pixels & have poor visible quality of the stego image.
i Some data hiding methods follow the principle that the edge
area can tolerate more changes than smooth areas. This does
not differentiate the texture features from edge ones.
iStep 20
Calculate the adaptive number k(i, j) of LSBs of each pixel
in the original cover-image based on the residual image Ir .
i The bit depth k¶ (i, j) can be obtained by formula0
Where
1 r 6, r represent the highest bits number of each pixel
used to calculate the hiding capacity in each pixel.
& 1 k¶ (i, j) 7- r
i k(i, j) obtained by applying histogram equalization to the bit
depth k¶(i, j).
$%
i Step 30
Generate a pseudo random sequence P with number 0 and
1 by a secret key defined as
P ={ p(i) |0 i < t, p(i) ¼ {0,1}}
i Step 50
Hide k(i, j) bits binary secret data b (i, j) into the cover-
image I by replacing the k(i, j) LSBs of the pixel value x (i, j)
with the integer d (i, j).
i Step 60
OPAP used for reduce the hiding error.
į(i, j) = x¶ (i, j) ± x (i, j)
Let į (i, j) be the hiding error between x (i,j) and x¶ (i, j)
$&
i Step 10
Extract the highest r (say r= 3) bits of the final stego-image S
to get the residual image Sr, note that Sr is the same as Ir since
data hiding is not applied to the highest r bits of each pixel.
i Step 20
Calculate the adaptive number k(i, j) of LSBs of each pixel in
the stego -image based on the residual image Sr .
i Step 30
Extract k(i, j) LSBs of the (i, j) th pixel value x´ (i, j) of
stego-image S directly. Let d¶ (i, j) denote the extracted secret
data.
i Step 40
Repeat Step 1-3 until all secret data W¶ is obtained.
inally, the final secret messages W´ can be obtained
r r
rr
rr
r
r r r
r r r r
i Banking application.
i Military Application.
i We have proposed a novel Steganographic method
by using human visual system (HVS) and LSB substitution,
This method avoid abrupt changes in the image edge areas
during data embedding procedure.