Professional Documents
Culture Documents
Stegnography Adaptive LSB Substitution
Stegnography Adaptive LSB Substitution
Presented By
Introduction of Steganography Different types Image stegnography Stegnography system Data hiding properties Previous methods & its drawbacks Adaptive LSB substitution method Experimental results Applications Conclusion
Stega covered, from the Greek stegos Nography - writing, from the Greek graphia
Art and Science of hiding information such that its presence cannot be detected and a communication is happening .
Hiding one information in other information.
Stegnography
Text
Image
Audio/Video
Protocol
Transform Domain
Image Domain
LSB substitution
LSB Matching
PVD
It is the most widely used medium. This field is expected to continually grow as computer graphics power also grows. Many programs are available to apply Steganography.
Imperceptibility
Previous methods
Simple LSB Substitution:
In this method the LSB of the cover image is directly replaced by the secret bit to get a stego image.
The LSB matching: Modifies the LSBs of the cover image for data hiding PVD method: It provides good imperceptibility by calculating the difference of two consecutive pixels to determine the depth of the embedded bits .
Some simple LSB approaches equally change the LSBs of all the pixels & have poor visible quality of the stego image. Cannot obtain good imperceptibility. Some data hiding methods follow the principle that the edge area can tolerate more changes than smooth areas. This does not differentiate the texture features from edge ones. Having the low data hiding capacity.
The stego image has low quality when equally changing LSBs of all pixels, to overcome this the HVS masking characteristics & OPAP techniques are used.
This method avoid abrupt changes in the image edge areas during data embedding procedure.
It can embed a large number of secrete data while achieving high quality of stego image.
Step 1: Extract the highest r (say r= 3) bits of the original image I to get the residual image Ir. where 1 r 6
Step 2: Calculate the adaptive number k(i, j) of LSBs of each pixel in the original cover-image based on the residual image Ir .
Where 1 r 6, r represent the highest bits number of each pixel used to calculate the hiding capacity in each pixel. & 1 k (i, j) 7- r
k(i, j) obtained by applying histogram equalization to the bit depth k(i, j).
Step 4: For the (i, j) th pixel of original image I, k (i, j) bits binary secret data are read from the ultimate secret data w one by one denoted as b (i, j), and then transform the binary number b into Its decimal value d (i, j). For example, assume b (i, j) = 1001(2), then d (i, j) =9. Step 5: Hide k(i, j) bits binary secret data b (i, j) into the coverimage I by replacing the k(i, j) LSBs of the pixel value x (i, j) with the integer d (i, j).
Step 6: OPAP used for reduce the hiding error. (i, j) = x (i, j) x (i, j) Let (i, j) be the hiding error between x (i,j) and x (i, j)
Step 2: Calculate the adaptive number k(i, j) of LSBs of each pixel in the stego -image based on the residual image Sr .
Step 3: Extract k(i, j) LSBs of the (i, j) th pixel value x (i, j) of stego-image S directly. Let d (i, j) denote the extracted secret data.
Step 4: Repeat Step 1-3 until all secret data W is obtained. Finally, the final secret messages W can be obtained W = {w(i) |w(i) = w(i) p(i) ,0 i t}
Cover image
r
1. 2. 3. 4. 5. 6.
Table: The average hiding capacity and PSNR values of the proposed method with r=1-6, for image size 512 * 512
Military Application.
We have proposed a novel Steganographic method by using human visual system (HVS) and LSB substitution, This method avoid abrupt changes in the image edge areas during data embedding procedure.
This method improves the quality of the stego image
CHIN-CHEN CHANG, MIN-HUI LIN, YU-CHEN HU A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition and Artificial Intelligence, 2002, vol. 16, no. 4, p. 399-416.
JEN-CHANG LIU, MING-HONG SHIH Generalizations of pixel value differencing steganography for data hiding in images. Fundamenta Informaticae, 2008, vol. 83, no. 3, p. 319-335. CHENG-HSING YANG, CHI-YAO WENG, SHIUH-JENG WANG, HUNG-MIN SUN Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 2008, 2008, vol. 3, no. 3, p. 488-497.
THANK YOU !