You are on page 1of 5

A new method for hierarchical image steganography.

BY SIRISHA.MOTHIKI sirisha.mothiki@gmail.com Ph:9573397032 M.V.D TANUJA tanuja.mvd@gmail.com ph:9440594512

1

individuals can notice at all that data exists in the sources[1]. In cryptography. The present paper found a novel fact that by inserting the hidden message bit using Least Significant Bit (LSB). in the method of cryptography. In the present paper a new method called “non linear hierarchical steganography” on 5X5 window pixel values. the grey value of the image pixel either remains same or increments or decrements by one. hidden message. individuals see the encoded data and notice that such data exists but they cannot comprehend it. The present paper is focused on this issue and found that such ambiguity of grey level values by LSB method comes between successive even and odd grey level values only.ABSTRACT: A good steganographic technique embeds information in to a carrier image with virtually imperceptible modification of the image. steganography. nobody can access the information. The word steganography is a Greek word that means ‘writing in hiding’. in steganography. non linear. intruders and those stealing information usually we use the cryptography method. This is a major distinction of this method with the other methods of hidden exchange of data because. While implementing this method. the main purpose is to hide data in a cover media so that other persons will not notice that such data is there. 2 . Key words: grey level value. embedding capacity and enhanced security. So without the key. A detailed algorithm is furnished along with the results of its application on some sample images. etc have been used. robustness INTRODUCTION: One of the grounds for discussion in the field of information security is the hidden exchange of information. coding. even and odd. steganography is widely used for hidden exchange of information. To fight against those people like hackers. the information is encrypted with a key and only the person who has the key can decrypt and read the information. for example. In recent years. various methods such as cryptography. To this end. The present approach allows for high robustness. But encrypted data will attract the attention. However. The novel method inserts hidden message on 5X5 windows based on their grey level values and coordinate positions. is proposed based on the above technique.

The successive even and odd values are treated as same in the 5x 5 window. music and sound [5]. METHODOLOGY: The present method of non linear hierarchical steganography is implemented on a 5 x 5 window. in addition to application of “cover exchange of information”. However the present paper shows four of them of size 100X100. Nowadays. The above process is applied on the following images and good results are obtained III. The results indicate robustness of the image and difficulty in breaking the embedded code. The steganography method. Fig 3(a) Fig 3(b) 3 . The results and discussions are given in section III and the final section gives conclusions. This paper is organized as follows: In section II methodology is given. video clips [3]. preventing e-document forging. etc [7]. however. It has also been implemented on such varying systems as computers and mobile phones [6]. information security has improved considerably with the other mentioned methods. II. In this paper we provide a new architecture platform for hierarchical grey level modification steganography system.Most steganography jobs have been performed on images [2]. text [4]. If two pixel grey level values have the same value then the least coordinated value by row wise will be treated as highest value. RESULTS and DISCUSSIONS: The proposed method is applied on more than 32 different images of size NXM where N and M are greater than or equal to 64. is also used in such other fields as copyright protection. Each character length has been made as 12 bits by appending four bits to each of the character. which embeds binary data with in the spatial domain of the grey scale images by modifying the grey level values of the nonlinearly selected pixels. The process is repeated for each 5X5 non overlapped window.

And it will become more difficult to break the text. CONCLUSIONS: The proposed steganographic method is non linear because message characters are interested based on the value of the grey level and its co-ordinate position. 4(a). REFERENCES: 4 . Thus the present method outperforms the existing LSB methods. 6(a): original images Fig 6(b) Fig 3(b). which makes the method as more dynamic. arises between successive even and odd values after inserting the hidden message using LSB. 6(b): stego images with hidden text “start attacking” IV. Future work includes extending the method based on descending order of pixel grey level values and appending more number of pixels for each character. The present method identified the ambiguity of grey level values. 5(a).Fig 4(a) Fig 4(b) Fig 5(a) Fig 5(b) Fig 6(a) Fig 3(a). The present method can also be applied on any window size. 5(b). 4(b).

"Steganography: Past. Springer Lecture Notes in Computer Science. Alattar and O. [2] R. 5306. 685-695. Girod. Vol. "Copyright Protection in Video Delivery Networks by Watermarking of Pre-Compressed Video. Judge. pp. Speech. Doërr and J. 1997. Steganography. vol.php?id=552". "SANS white paper. Hartung and B. [3] G. [7] F. Issue 7.421-424. "An Improved Method for Steganography on Mobile Phone. [4] A. 2003. June 2004.M. Future. 3. 955-957. and Signal Processing.M. vol. of the IEEE International Conference on Acoustics. 263-282. 423-436. Springer. pp. pp. [6] M. Alattar.org/rr/papers/index. 1019 . 710 Oct. 2001. Services and Techniques .1022. pp. 2." WSEASTransactions on Systems.sans." Signal Processing: Image Communication." Proceedings of SPIE. issue 4. "Audio steganography using bit modification. Shirali Shahreza.ECMAST '97'. "Watermarking electronic text documents containing justified paragraphs and irregular line spacing.[1] J.L. 6-10 April 2003. Heidelberg. July 2005. Vol. Memon. 18. "A Guide Tour of Video Watermarking. 4." Proceedings. (ICASSP '03). 5 . "Analysis of LSB based image steganography techniques. 1242. lass visited: 10 February 2006. Vol. pp. 2001. pp. Dugelay. [5] K. November 30. Security. and Watermarking of Multimedia Contents VI. Gopalan." Proceedings of the International Conference on Image Processing. Present. "http://www. Chandramouli.C. vol." Multimedia Applications. N.