You are on page 1of 25

A Seminar On Stegnography (Adaptive LSB Substitution)

Presented By

Mr. Arjun R. Nichal

Introduction of Steganography Different types Image stegnography Stegnography system Data hiding properties Previous methods & its drawbacks Adaptive LSB substitution method Experimental results Applications Conclusion

Stega covered, from the Greek stegos Nography - writing, from the Greek graphia

Art and Science of hiding information such that its presence cannot be detected and a communication is happening .
Hiding one information in other information.

Stegnography

Text

Image

Audio/Video

Protocol

Transform Domain

Image Domain

LSB substitution

LSB Matching

PVD

It is the most widely used medium. This field is expected to continually grow as computer graphics power also grows. Many programs are available to apply Steganography.

Data Payload (Embedding capacity)

Imperceptibility

Previous methods
Simple LSB Substitution:
In this method the LSB of the cover image is directly replaced by the secret bit to get a stego image.
The LSB matching: Modifies the LSBs of the cover image for data hiding PVD method: It provides good imperceptibility by calculating the difference of two consecutive pixels to determine the depth of the embedded bits .

Some simple LSB approaches equally change the LSBs of all the pixels & have poor visible quality of the stego image. Cannot obtain good imperceptibility. Some data hiding methods follow the principle that the edge area can tolerate more changes than smooth areas. This does not differentiate the texture features from edge ones. Having the low data hiding capacity.

The stego image has low quality when equally changing LSBs of all pixels, to overcome this the HVS masking characteristics & OPAP techniques are used.
This method avoid abrupt changes in the image edge areas during data embedding procedure.

It can embed a large number of secrete data while achieving high quality of stego image.

Let I be the original 256-level grayscale image of size m*n represented as

W be the t-bit secret data represented as W= {w (i) | 0 i < t, w (i) {0,1}}

Step 1: Extract the highest r (say r= 3) bits of the original image I to get the residual image Ir. where 1 r 6

Step 2: Calculate the adaptive number k(i, j) of LSBs of each pixel in the original cover-image based on the residual image Ir .

The bit depth k (i, j) can be obtained by formula:

Where 1 r 6, r represent the highest bits number of each pixel used to calculate the hiding capacity in each pixel. & 1 k (i, j) 7- r

k(i, j) obtained by applying histogram equalization to the bit depth k(i, j).

Data Hiding algorithm


Step 3: Generate a pseudo random sequence P with number 0 and 1 by a secret key defined as P ={ p(i) |0 i < t, p(i) {0,1}} Applying the element-wise XOR operation of the original secret messages W and the pseudo random sequence P represented as W= {w (i) |w (i) = w (i) p (i), 0 i < t}

Step 4: For the (i, j) th pixel of original image I, k (i, j) bits binary secret data are read from the ultimate secret data w one by one denoted as b (i, j), and then transform the binary number b into Its decimal value d (i, j). For example, assume b (i, j) = 1001(2), then d (i, j) =9. Step 5: Hide k(i, j) bits binary secret data b (i, j) into the coverimage I by replacing the k(i, j) LSBs of the pixel value x (i, j) with the integer d (i, j).

Step 6: OPAP used for reduce the hiding error. (i, j) = x (i, j) x (i, j) Let (i, j) be the hiding error between x (i,j) and x (i, j)

Data extraction algorithm


Step 1: Extract the highest r (say r= 3) bits of the final stego-image S to get the residual image Sr, note that Sr is the same as Ir since data hiding is not applied to the highest r bits of each pixel.

Step 2: Calculate the adaptive number k(i, j) of LSBs of each pixel in the stego -image based on the residual image Sr .

Step 3: Extract k(i, j) LSBs of the (i, j) th pixel value x (i, j) of stego-image S directly. Let d (i, j) denote the extracted secret data.
Step 4: Repeat Step 1-3 until all secret data W is obtained. Finally, the final secret messages W can be obtained W = {w(i) |w(i) = w(i) p(i) ,0 i t}

Cover image

Stego image Embedded data are 757332 bits. (r=4)

Difference between cover & stego image

r
1. 2. 3. 4. 5. 6.

Bit rate (bpp) 5.2634 4.4940 3.7809 2.9425 1.9561 1.0000

Capacity (bits) 1379767 1178068 991137 771354 512787 262144

PSNR (dB) 22.69 28.45 33.65 39.23 45.27 51.14

Table: The average hiding capacity and PSNR values of the proposed method with r=1-6, for image size 512 * 512

Smart IDs. Companies secret data safe circulation. Banking application.

Military Application.

We have proposed a novel Steganographic method by using human visual system (HVS) and LSB substitution, This method avoid abrupt changes in the image edge areas during data embedding procedure.
This method improves the quality of the stego image

The proposed method achieves higher embedding capacity and imperceptibility.

CHIN-CHEN CHANG, MIN-HUI LIN, YU-CHEN HU A fast and secure image hiding scheme based on LSB substitution. International Journal of Pattern Recognition and Artificial Intelligence, 2002, vol. 16, no. 4, p. 399-416.
JEN-CHANG LIU, MING-HONG SHIH Generalizations of pixel value differencing steganography for data hiding in images. Fundamenta Informaticae, 2008, vol. 83, no. 3, p. 319-335. CHENG-HSING YANG, CHI-YAO WENG, SHIUH-JENG WANG, HUNG-MIN SUN Adaptive data hiding in edge areas of images with spatial LSB domain systems. IEEE Transactions on Information Forensics and Security, 2008, 2008, vol. 3, no. 3, p. 488-497.

THANK YOU !

You might also like