Stegnography (Adaptive LSB Substitution)
-
Upload
arjun-nichal -
Category
Documents
-
view
459 -
download
7
Transcript of Stegnography (Adaptive LSB Substitution)
![Page 1: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/1.jpg)
AASeminarSeminar
OnOnStegnography (Adaptive LSB Stegnography (Adaptive LSB
Substitution)Substitution)
Presented ByPresented By
Mr. Arjun R. NichalMr. Arjun R. Nichal
![Page 2: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/2.jpg)
Introduction of Steganography Different types Image stegnography Stegnography system Data hiding properties Previous methods & its drawbacks Adaptive LSB substitution method Experimental results Applications Conclusion
![Page 3: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/3.jpg)
Stega – covered, from the Greek “stegos” Nography - writing, from the Greek “graphia” Art and Science of hiding information such that its presence
cannot be detected and a communication is happening .
Hiding one information in other information.
![Page 4: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/4.jpg)
Stegnography
Text ProtocolImage Audio/Video
PVDLSB
substitutionLSB
Matching
ImageDomain
TransformDomain
![Page 5: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/5.jpg)
It is the most widely used medium.
This field is expected to continually grow as computer graphics power also grows.
Many programs are available to apply Steganography.
![Page 6: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/6.jpg)
![Page 7: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/7.jpg)
Data Payload (Embedding capacity)
Imperceptibility
![Page 8: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/8.jpg)
Simple LSB Substitution:
In this method the LSB of the cover image is directly replaced by the secret bit to get a stego image.
The LSB matching:
Modifies the LSBs of the cover image for data hiding
PVD method: It provides good imperceptibility by calculating the difference
of two consecutive pixels to determine the depth of the embedded bits .
Previous methodsPrevious methods
![Page 9: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/9.jpg)
Some simple LSB approaches equally change the LSBs of all the pixels & have poor visible quality of the stego image.
Cannot obtain good imperceptibility.
Some data hiding methods follow the principle that the edge area can tolerate more changes than smooth areas. This does not differentiate the texture features from edge ones.
Having the low data hiding capacity.
![Page 10: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/10.jpg)
The stego image has low quality when equally changing LSBs of all pixels, to overcome this the HVS masking characteristics & OPAP techniques are used.
This method avoid abrupt changes in the image edge areas during data embedding procedure.
It can embed a large number of secrete data while achieving high quality of stego image.
![Page 11: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/11.jpg)
Let I be the original 256-level grayscale image of size m*n represented as
W be the t-bit secret data represented as
W= {w (i) | 0 ≤ i < t, w (i) € {0,1}}
![Page 12: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/12.jpg)
Step 1: Extract the highest r (say r= 3) bits of the original image I
to get the residual image Ir. where 1≤ r ≤ 6
Step 2: Calculate the adaptive number k(i, j) of LSBs of each
pixel in the original cover-image based on the residual image Ir .
![Page 13: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/13.jpg)
The bit depth k’ (i, j) can be obtained by formula:
Where 1≤ r ≤ 6, r represent the highest bits number of each
pixel used to calculate the hiding capacity in each pixel. & 1 ≤ k’ (i, j) ≤ 7- r
![Page 14: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/14.jpg)
k(i, j) obtained by applying histogram equalization to the bit depth k’(i, j).
![Page 15: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/15.jpg)
Step 3: Generate a pseudo random sequence P with number 0
and 1 by a secret key defined as P ={ p(i) |0 ≤ i < t, p(i) € {0,1}} Applying the element-wise XOR operation of the original
secret messages W and the pseudo random sequence P represented as
W˜= {w˜ (i) |w˜ (i) = w (i) p (i), 0 ≤ i < t}
Data Hiding algorithmData Hiding algorithm
![Page 16: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/16.jpg)
Step 4:For the (i, j) th pixel of original image I, k (i, j) bits binary secret data are read from the ultimate secret data w˜ one by one denoted as b (i, j), and then transform the binary number b into Its decimal value d (i, j).
For example, assume b (i, j) = 1001(2), then d (i, j) =9.
Step 5: Hide k(i, j) bits binary secret data b (i, j) into the
cover-image I by replacing the k(i, j) LSBs of the pixel value x (i, j) with the integer d (i, j).
![Page 17: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/17.jpg)
Step 6: OPAP used for reduce the hiding error.
δ(i, j) = x’ (i, j) – x (i, j)Let δ (i, j) be the hiding error between x (i,j) and x’ (i, j)
![Page 18: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/18.jpg)
Step 1:
Extract the highest r (say r= 3) bits of the final stego-image S to get the residual image Sr, note that Sr is the same as Ir since data hiding is not applied to the highest r bits of each pixel.
Step 2: Calculate the adaptive number k(i, j) of LSBs of each
pixel in the stego -image based on the residual image Sr .
Data extraction algorithmData extraction algorithm
![Page 19: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/19.jpg)
Step 3: Extract k(i, j) LSBs of the (i, j) th pixel value x” (i, j)
of stego-image S directly. Let d’ (i, j) denote the extracted secret data.
Step 4:Repeat Step 1-3 until all secret data W’ is obtained.
Finally, the final secret messages W” can be obtained W” = {w”(i) |w”(i) = w’(i) p(i) ,0 ≤ i ˂ t}
![Page 20: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/20.jpg)
Cover imageCover image Stego imageStego imageEmbedded data are 757332 bits.Embedded data are 757332 bits. (r=4)(r=4)
Difference between cover & stego imageDifference between cover & stego image
![Page 21: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/21.jpg)
Table: The average hiding capacity and PSNR values of the proposed method with r=1-6, for image size 512 * 512
rBit rate(bpp)
Capacity(bits)
PSNR(dB)
1. 5.2634 1379767 22.69
2. 4.4940 1178068 28.45
3. 3.7809 991137 33.65
4. 2.9425 771354 39.23
5. 1.9561 512787 45.27
6. 1.0000 262144 51.14
![Page 22: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/22.jpg)
Smart IDs.
Companies’ secret data safe circulation.
Banking application.
Military Application.
![Page 23: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/23.jpg)
We have proposed a novel Steganographic method by using human visual system (HVS) and LSB substitution, This method avoid abrupt changes in the image edge areas during data embedding procedure.
This method improves the quality of the stego image
The proposed method achieves higher embedding capacity and imperceptibility.
![Page 24: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/24.jpg)
CHIN-CHEN CHANG, MIN-HUI LIN, YU-CHEN HU “A fast and secure image hiding scheme based on LSB substitution”. International Journal of Pattern Recognition and Artificial Intelligence, 2002, vol. 16, no. 4, p. 399-416.
JEN-CHANG LIU, MING-HONG SHIH “Generalizations of pixel value differencing steganography for data hiding in images.” Fundamenta Informaticae, 2008, vol. 83, no. 3, p. 319-335.
CHENG-HSING YANG, CHI-YAO WENG, SHIUH-JENG WANG, HUNG-MIN SUN “Adaptive data hiding in edge areas of images with spatial LSB domain systems”. IEEE Transactions on Information Forensics and Security, 2008, 2008, vol. 3, no. 3, p. 488-497.
![Page 25: Stegnography (Adaptive LSB Substitution)](https://reader035.fdocuments.net/reader035/viewer/2022081421/5517737e497959a3308b4a02/html5/thumbnails/25.jpg)
THANK YOU !