Ijert: A Combined Image Steganography Technique Based On Edge Concept & Dynamic LSB
Ijert: A Combined Image Steganography Technique Based On Edge Concept & Dynamic LSB
Ijert: A Combined Image Steganography Technique Based On Edge Concept & Dynamic LSB
ISSN: 2278-0181
Vol. 1 Issue 8, October - 2012
Abstract
IJE
RT
1. Introduction
In recent years, enormous research efforts have been
invested in the development of digital image
steganographic techniques. Image steganography is a
secret communication technique used to transmit secret
messages that have been embedded into an image. In
image steganography, the original image and the
embedded image are called the cover image and the
stego image, respectively. The sender hides the secret
message in a cover image that has no meaning, and
then transmits the stego image to the receiver through a
public channel. In the transmission process, the public
channel may be intentionally monitored by some
opponent who tries to prevent the message from being
successfully sent and received. The opponent may
randomly attack the stego image if he/she doubts the
stego image carries any secret message because the
appearance of the stego image shows obvious artifacts
of hiding effect (Liao et al., 2007). For this reason, an
ideal steganography scheme, to keep the stego image
www.ijert.org
2. Background
2.1. Least Significant Bit Hiding (LSB) Scheme:
Least significant bit (LSB) insertion is a common and
simple approach to embed information in a cover file: it
overwrites the LSB of a pixel with an s bit.
Unfortunately, modifying the cover image changes its
statistical properties, so eavesdroppers can detect the
distortions in the resulting stego images statistical
properties. The general operation of data hiding by
using a simple LSB substitution method is described in
this section.
Many steganogrphic methods embed a large amount
of the secret information in the first k LSBs of the
cover image pixels. Because of the imperfect sensibility
of the human visual system, the existence of the
embedded secret information can be imperceptible.
A digital image I can be represented by a two
dimensional, with size (N= width height). Each
image is composed of finite elements each of which has
a definite location and amplitude. These elements are
referred to as image pixels, I = {P1,..,PN}, where every
pixel in the greyscale image consists of 8 bits:
=
8,
, where:
LSB with k embedding factor
, for every
targeted for embedding data bits replaces the set of
bits:
, , keeping the rest of bits
without effect.
The generated set of pixels
represents as
the stego image , where:
,
IJE
RT
www.ijert.org
P(i,j+1)
P(i+1,j)
P(i+1,j+1)
IJE
RT
P(i ,j)
www.ijert.org
.
(6)
Where
,
are the first and second bits of the
pixel respectively. Then, the embedding continues as
follows,
to 8)
(7)
Where j is the bit index of the smooth pixel , the
metadata about last embedding in the pixel is saved
in the 3LSBs of the corresponding edge pixel .
Step 5: After embedding all the secret data bits, the
stego image is generating.
The block diagram of the entire embedding procedure
is represented in Figure 2.
IJE
to binary system
j =1
=
=
No
if
i=i+1
go to next
pixel
No
4. Experimental Results
RT
, k = k +1
, k = k +1
yes
No
i = i +1
yes
(a) Baboon
(b) Lena
(c) Pepper
(d) Cameraman
k = k+1
j = j+1
if k = secret data size
No
if j > 8
yes
yes
Save last occurrence of embedded data on 3Lsbs of Ei
Stego image
is produced
www.ijert.org
(9)
Where
is the mean square error between the cover
and stego images. For a cover image whose width and
height are
and ,
is defined as:
(10)
Where
and
are the pixel values of the cover and
stego images, respectively.
Cover Images
Baboon
Lena
Pepper
Cameraman
Avg.
Capacity
(Bits/pixel)
1.56
1.47
1.45
1.54
Avg.
PSNR
(dB)
41.74
41.10
41.40
39.00
RT
(11)
IJE
8676
Pixel
2803
Pixel
7401
Pixel
7097
Pixel
Stego images
Greyscale
images
www.ijert.org
5. Conclusion
References
RT
[9] Chou, Y.; Chang, C. and Li, K., (2008) A Large Payload
Data Embedding Technique for Color Images, Fundamenta
Informaticae, vol. 88, pp. 47-61.
[10] Franz, E.; Jerichow, A.; Moller, S.; Pftizmann, A. and
Stierland, I., (1996) Computer Based Steganography, in
Information Hiding, Springer Lucture Notes in Computer
Science, vol. 1174, pp 7-21.
[11] Huang, W.; Zhao, Y. and Ni, R., (2011) Block-Based
Adaptive Image Steganography Using LSB Matching
Revisited, Journal of Electronic Science and Technology,
vol. 9, no. 4, pp. 291-296.
[12] Kekre, H.; Athawale, A. and Halarnkar, P., (2008)
Increased Capacity of Information Hiding in LSBs Method
for Text and Image, International Journal of Electrical,
Computer, and Systems Engineering, vol. 2, no.4, pp. 246249.
[13] Ker, A., (2005) Improved Detection of LSB
Steganography in Grayscale Images, in: J. Fridrich (Ed.),
Information Hiding, Sixth International Workshop, Lecture
Notes in Computer Science, Springer, New York, vol. 3200,
pp. 97115.
[14] Khalaf, E. and Sulaiman, N., (2011) A Robust Data
Hiding Technique based on LSB Matching, World Academy
of Science, Engineering and Technology, vol. 58, pp. 117121.
[15] Kim, K.; Jung, K. and Yoo, Y., (2008) A High Capacity
Data Hiding Method using PVD and LSB, International
Conference on Computer Science and Software Engineering,
pp. 876-879.
[16] Li, S.; Leung, K.; Cheng, L. and Chan, C., (2006)
Performance Evaluation of a Steganographic Method for
Digital Images Using Side Match, First International
Conference on Innovative Computing, Information and
Control - Volume III (ICICIC'06), vol. 3, pp. 54-57.
[17] Li, S.; Leung, K.; Cheng, L. and Chan, C., (2006) Data
Hiding in Images by Adaptive LSB Substitution Based on the
Pixel-Value Differencing, Proceedings of the First
International Conference on Innovative Computing,
Information and Control (ICICIC'06).
[18] Liao, Z.; Huang, Y. and Li, C., (2007) Research on data
hiding capacity, International Journal of Network Security,
vol. 5, pp140-144.
[19] Liao, X.; Wen, Q. and Zhang, J., (2011) A
steganographic method for digital images with four-pixel
differencing and modified LSB substitution, J. Vis.
Commun. Image R., vol. 22, pp. 1-8.
[20] Mohamed, M.; Al-Afari, F. and Bamatraf, M., (2011)
Data Hiding by LSB Substitution Using Genetic Optimal
Key-Permutation, International Arab Journal of eTechnology, vol. 2, pp. 11-17.
[21] Padmaa, M. and Venkataramani, Y., (2010) Zig-Zag
PVD - A Nontraditional Approach, International Journal of
Computer Applications, vol.5, pp. 5-10.
[22] Wang, C.; Wu, N.; Tsai, C. and Hwang, M., (2008) A
high quality steganographic method with pixel-value
differencing and modulus function, The Journal of Systems
and Software, vol. 81, pp. 150-158.
[23] Wang, R.; Lin, C. and Lin, J., (2001) Image Hiding by
Optimal LSB Substitution and Genetic Algorithm, Pattern
Recognition, vol. 34, no. 3, pp. 671-683.
[24] Wu, D. and Tsai, W., (2003) A steganographic method
for images by pixel-value differencing, Pattern Recognition
Letters, vol. 24, pp. 1613-1626.
IJE
www.ijert.org
IJE
RT
[25] Wu, H.; Tsai, C.; Wu, N. and Hwang, M., (2005) Image
Steganographic Scheme Based on Pixel-Value Differencing
and LSB Replacement Methods, In: IEE Proceedings
Vision, Image and Signal Processing, vol. 152, pp. 611-615.
[26] Wu, N. and Hwang, M., (2007) Data hiding: current
status and key issues, International Journal of Network
Security, vol. 4, pp 1-9.
[27] Yang, C. and Weng, C., (2006) A Steganographic
Method for Digital Images by Multi-Pixel Differencing, in:
Proceedings of International Computer Symposium, Taipei,
Taiwan, R.O.C., pp. 831-836.
[28] Yang, C.; Wang, S. and Weng, C., (2007) Analyses of
Pixel-Value-Differencing Schemes with LSB Replacement in
Stegonagraphy, In: Proc. of the 3rd Int. Conf. on Intelligent
Information Hiding and Multimedia Signal Processing, vol.
1, pp. 445-448.
[29] Yang, C.; Weng, C.; Wang, S. and Sun, H., (2008)
Adaptive Data Hiding in Edge Areas of Images With Spatial
LSB Domain Systems, IEEE Transactions on Information
Forensics and Security, vol. 3, no. 3, pp. 488-497.
[30] Zhang, H.; Geng, G. and Xiong, C., (2009) Image
Steganography using Pixel-Value Differencing, Second
International Symposium on Electronic Commerce and
Security, pp 109-112.
www.ijert.org