SlideShare a Scribd company logo
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
   INTERNATIONAL JOURNAL OF ELECTRONICS AND
   0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME
COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 4, Issue 1, January- February (2013), pp. 230-235
                                                                             IJECET
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2012): 3.5930 (Calculated by GISI)                  ©IAEME
www.jifactor.com




            CONCEALOGRAM: DIGITAL IMAGE IN IMAGE USING LSB
                        INSERTION METHOD


                                    Reena M Patel1, D J Shah2
        1
            EC department, LDRP Institute of Technology & Research, Near ITI, Sector 15,
                                     Gandhinagar, Gujarat, India,
               2
                Principal, L C institute of technology, Bhandu 384124, Gujarat, India,


   ABSTRACT

           In this paper, the authors propose a new algorithm for an image hiding
   steganographic method or concealing digital image in a cover image is introduced, and
   implemented. The proposed algorithm uses binary codes and pixels inside an image. For
   proposed paper author used spatial domain approach. The algorithm tested to see the
   viability of the proposed algorithm. Here using different algorithm, same sizes of data are
   stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for
   each of the images tested. Various parameters like robustness against attack, data hiding
   capacity and quality of stego image are also considered. Hence this new steganography
   algorithm is very efficient to hide the digital image inside the image.

   Keywords: cover image, image processing, LSB insertion, Steganography, stegoimage

   1. INTRODUCTION

          Steganography is the science of hiding information. The goal of steganography is
   to hide the information and be undetectable to human eyes. Steganography focuses on the
   means of communication and the development of a covert channel. Steganography
   focuses entirely on keeping the adversary completely unaware of the communication.
   There are several information hiding techniques, they could be classified according to the
   media where the information are hidden. First, Hiding in Text, methods such as line-shift
   coding, word shift coding, and feature coding are the commonly used methods to hide
   data in text. When using a text data as a host media, the embedded data are usually
                                                 230
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME

codeword that are hidden within the text by altering their different textual features [1].
Second, data hiding in image, the least significant bit insertion method is a common
simple approach for embedding information in image file. When applying LSB insertion
method on each byte of a 24-bit image, three bits can be encoded into each pixel (because
each pixel is represented by three bytes). Any changes in the pixel bits will be
indiscernible to the human eye. When using LSB techniques on 8-bit color images (i.e.,
palate driven), more care need to be taken. So, for 8-bit images only the grey images are
recommended for data hiding [2].
         Three different aspects in information hiding systems contend with each other:
capacity, security, and robustness. All steganographic methods have to comply be applied
with a few basic requirements (i.e., invisibility, payload capacity, robustness against
statistical attacks, robustness against image manipulation, independent of file format, and
unsuspicious files [3].

2. RELATED WORK

       Hiding data is the process of embedding information into digital content without
causing perceptual degradation [4]. In data hiding, three famous techniques can be used.
They are watermarking, steganography and cryptography. Steganography is defined as
covering writing in Greek. It includes any process that deals with data or information
within other data. According to Lou et al. [5], steganography is hiding the existence of a
message by hiding information into various carriers. The major intent is to prevent the
detection of hidden information. Research in steganography technique has been done
back in ancient Greek where during that time the ancient Greek practice of tattooing a
secret message on the shaved head of a messenger, and letting his hair grow back before
sending him through enemy territory where the latency of this communications system
was measured in months [6]. However, the majority of the development and use of
computerized steganography only occurred in year 2000 [7]. There are several
steganography techniques used for hiding data such as batch steganography, permutation
stehanography, least significant bits (LSB), bit-plane complexity segmentation (BPCS)
and chaos based spread spectrum image steganography (CSSIS).

3. PROPOSED METHODS FOR HIDING IMAGE IN IMAGE

   3.1 4 bit data hiding method

   Each pixel contains 8 bits, the right most bit is Least Significant Bit (LSB) and left
   most bit is (Most Significant Bit) MSB. Four bit data hiding method, which embeds
   first four MSB bits (MSB,MSB-1,MSB-2,MSB-3) of secret image into last four LSB
   bits (LSB, LSB+1, LSB+2,LSB+3) of cover image. So last 4 bits of cover image is
   replace with first four bits of secret image. Now next pixel of cover image is taken
   and again 4 MSB bits of next pixel of secret image is inserted into 4 LSB bits of cover
   image.



                                              231
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME



                                      Cover image
          Pixel 1                         Pixel 2        Pixel 3
    1 0 1 1 0 0             1    1 1 1 0 1 0 1 1 0 0 1 0 0 1 0 0 1
             LS LS          LS
                               LS
             B+ B+          B+
                               B
              3 2            1


                     Secret image
           Pixel 1        Pixel 2        Pixel 3
   1 0 0 0 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 0 1 1 0 0
   MS MS MS MS
   B B-1 B-2 B-3


                                         Stego image
                Pixel 1                   Pixel 2          Pixel 3
    1   0   1   1 1 0       0   0    1 1 0 1 0 1 0 1 0 1 0 0 1 1 0 0

                            Fig.1. Data hiding process using 4 bit method

       In this method only 4 MSB bits of each pixel of secret image is considered. Because
   of Lower bits of pixel is not contain more information here we omit remaining four bits
   (LSB, LSB+1, LSB+2, LSB+3) of secret image. The data to be hidden is converted to
   binary form. In Fig.1 gray shad shows that the last 4 LSB bit of cover image is replace
   with first 4 MSB bits of secret image. Image processing fundamental said that (‘LSB
   contain less information’), so if we change LSB data it not disturb the quality of image. In
   proposed method we omit last 4 bits LSB of each Pixel from secret image. Now next
   pixel of cover image is taken for data hiding. The manipulation of the three bit alters the
   color of the pixel, but this manipulate change cannot easily be perceived by the human
   eye.

   3.2 6 bit data hiding method

       Six bit data hiding method embeds first three MSB bits (MSB, MSB-1, MSB-2) of
   secret image into last three LSB bits (LSB, LSB+1, LSB+2) of cover image. Again three
   bits of secret image (MSB-3, MSB-4, MSB-5) is stored in 3 LSB bits of next pixel of
   cover image. So we are hiding total six MSB bits of secret image into cover image. Cover
   image embeds three bit data in each pixel byte. The data to be hidden is converted to
   binary form. In Fig.2 gray shad shows that the last 3 LSB bit of cover image is replace
   with first 3 MSB bits (1, 0, 0) of secret image. From MSB-3, next 3 bits (0, 0, 0) from
   Pixel 1 of Secret image is stored into 3 LSB bits of cover image Pixel 2. In proposed
   method we omit last 2bits LSB of each Pixel from secret image.



                                              232
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME



                                        Cover image
                Pixel 1                     Pixel 2        Pixel 3
    1   0   1   1 0 0        1 1      1 1 0 1 0 1 1 0 0 1 0 0 1 0 0 1
                       LS    LS
                                LS
                       B+    B+
                                B
                        2     1


                                     Secret image
            Pixel 1                        Pixel 2       Pixel 3
   1 0 0 0 0 0                 1 1 0 1 0 1 1 1 0 0 1 1 0 0 1 1 0 0
   MS MS MS MS MS MS
   B B-1 B-2 B-3 B-4 B-5


                                           Stego image
                Pixel 1                         Pixel 2                   Pixel 3
   1    0   1   1 0 1         0 0 1 1 0 1 0 0 0 0 0 1 0 0 1 0 1 0
                            Fig.2. Data hiding process using 3 bit method


4. PSNR CALCULATION

        We then tested the algorithm using the PSNR (Peak signal-to-noise ratio). PSNR is a
standard measurement used in steganograpy technique in order to test the quality of the stego
images. The higher the value of PSNR, the more quality the stego image will have. If the
cover image is C of size M × M and the stego image is S of size N × N, then each cover
image C and stego image S will have pixel value (x, y) from 0 to M-1 and 0 to N-1
respectively. The PSNR is then calculated as follows:
                                      ࡾ૛                     ∑    ሾࡵ ሺ࢓,࢔ሻିࡵ ሺ࢓,࢔ሻሿ૛
                ࡼࡿࡺࡾ ൌ ૚૙ ‫ ܏ܗܔ‬૚૙ ቀࡹࡿࡱቁ Where ࡹࡿࡱ ൌ ࡹ,ࡺ ૚ ࡹ‫ ࡺכ‬૛
        Note that R is the maximum possible pixel value of the images. For example, if the
pixels are represented using 8 bits per sample, then the R value is 255. If the stego image has
a higher PSNR value, then the stego image has more quality image.

5. RESULTS

   5.1. 4 bit data hiding method
               Fig. 3 shows the application of this method. We have cover image as lena
   (size: 512x512) and secret image as cameraman (size: 256x256). Fig 3 shows stegno
   image after hidden image stored in cover image. We get index 143 (at location X=32,
   Y=100) for cover image while we get index 138 (at location X=32, Y=100) for stegno
   image i.e. index is changed. Also we get PSNR is equal to 38.41 dB.


                                               233
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME




                       Fig: 3 Four bit data Hiding Method Results


   5.2. 6 bit data hiding method




                       Fig: 4 Six bit data Hiding Method Results

       Fig 4 shows the application of this method. Once again we select lena as cover image
   and cameraman as secret image. And execute the algorithm. As shown in Fig 4 we get
   index 143 (at location X=32, Y=100) for cover image while we get index 141 (at location
   X=32, Y=100) for stegno image i.e. index is changed. Also we get PSNR is equal to
   41.38 dB. We get better quality of stego image compare to 4 bit method since we are
   using 3 bits to embed data. Also the quality of received image is better than that of 4 bit
   method because 6 bits of original image is used instead of 4 bits.
                                              234
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN
0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME

6. CONCLUSION

       Results indicate that 6 bit data hiding method perform better than 4 bit data hiding
method. We have less data hiding capacity in 6 bit data hiding method but at the same time
we get better stego image & higher PSNR. When applying 6 bit data hiding method on each
byte of a 24-bit image, nine bits can be encoded into each pixel (because each pixel is
represented by three bytes). Also for 8-bit image, 3 bits can be encoded into each pixel. In
this method any changes in the pixel bits will be barely visible to the human eye.

REFERENCES

 [1] Jawad M. J., ”Hiding Audio Using Wavelet Transform”,M.Sc. thesis, college of science,
     Al-Nahrain University, Iraq, 2005.
 [2] Kessler G. C., “Hiding Data Within Data”, paper, Champlain College in Burlington,
     2001. http://www.garykessler.net/library/steganography.html
 [3] Morkel T., Eloff J. H. P., and Olivier M. S., “An Overview of Image Steganography”,
     Information and Computer Security Architecture (ICSA) Research Group, University of
     Pretoria, South Africa, 2005.
 [4] M. Chen, N. Memon, E.K. Wong, Data hiding in document images, in: H. Nemati (Ed.).
     Premier Reference Source–Information Security and Ethics: Concepts, Methodologies,
     Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450.
 [5] D.C. Lou, J.L. Liu, H.K. Tso, Evolution of information – hiding technology, in H. Nemati
     (Ed.), Premier Reference Source–Information Security and Ethics: Concepts,
     Methodologies, Tools and Applications, New York: Information Science Reference,
     2008, pp. 438-450.
 [6] Schneider, Secrets & Lies, Indiana:Wiley Publishing, 2000.
 [7] E. Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication,
     Indianapolis: Wiley Publishing, 2003.
 [8] Nagham Hamid, Abid Yahya ,R. Badlishah Ahmad and Osamah M. Al-Qershi, “An
     Improved Robust And Secured Image Steganographic Scheme” International journal of
     Electronics and Communication Engineering &Technology (IJECET), Volume 3, Issue 3,
     2012, pp. 22 - 33, Published by IAEME.
 [9] R. Pushpavalli and G.Sivaradjei, “Nonlinear Filtering Technique For Preserving Edges
     and Fine Details of Digital Images” International journal of Electronics and
     Communication Engineering &Technology (IJECET), Volume 3, Issue 1, 2012,
     pp. 29-40, Published by IAEME.
[10] Ankit Vidyarthi and Ankita Kansal, “A Survey Report On Digital Images Segmentation
      Algorithms” International journal of Computer Engineering & Technology (IJCET),
      Volume 3, Issue 2, 2012, pp. 85 - 91, Published by IAEME.
[11] Miss. Vismita Nagrale, Mr. Ganesh Zambre and Mr. Aamir Agwani, “Image Stegano-
     Cryptography Based on LSB Insertion & Symmetric Key Encryption” International
     journal of Electronics and Communication Engineering &Technology (IJECET),
     Volume 2, Issue 1, 2011, pp. 35-42, Published by IAEME.




                                              235

More Related Content

PDF
An LSB Method Of Image Steganographic Techniques
PDF
Steganography based on random pixel selection for efficient data hiding 2
PDF
Ijnsa050205
PDF
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
PDF
Visual cryptography scheme for color images
PDF
Frequency Domain Approach of Image Steganography
PDF
1. updated document ed sat
PDF
An unsupervised method for real time video shot segmentation
An LSB Method Of Image Steganographic Techniques
Steganography based on random pixel selection for efficient data hiding 2
Ijnsa050205
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
Visual cryptography scheme for color images
Frequency Domain Approach of Image Steganography
1. updated document ed sat
An unsupervised method for real time video shot segmentation

What's hot (12)

PDF
L045056469
PDF
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
PDF
Implementation of image steganography using lab view
PDF
Image Cryptography using Nearest Prime Pixels
PDF
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
PDF
50120140501019
PDF
D0341829
PDF
A comparatively study on visual cryptography
PDF
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
PDF
Improving wpt color_image_decomposition
PDF
An enhanced least significant bit steganographic method for information hiding
PDF
Digital image compression techniques
L045056469
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Implementation of image steganography using lab view
Image Cryptography using Nearest Prime Pixels
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
50120140501019
D0341829
A comparatively study on visual cryptography
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Improving wpt color_image_decomposition
An enhanced least significant bit steganographic method for information hiding
Digital image compression techniques
Ad

Viewers also liked (7)

PPT
Reação química
DOC
Planificación textos normativos
PPT
PPTX
WilmaSPEC
PPTX
Presentación general del OECC de la Universidad del Norte (2009-2013)
PPTX
Presentació1
Reação química
Planificación textos normativos
WilmaSPEC
Presentación general del OECC de la Universidad del Norte (2009-2013)
Presentació1
Ad

Similar to Concealogram digital image in image using lsb insertion method (20)

PDF
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
PDF
IRJET- Image Processing using Steganography
PDF
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
PDF
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
PDF
American standard code for information interchange mapping technique for tex...
PDF
Hide text depending on the three channels of pixels in color images using the...
PDF
A- Review On Image Steganography
PDF
Image Steganography V2 i11 0143
PDF
Securing Web Communication Using Three Layer Image Shielding
PDF
A Survey of Image Based Steganography
PDF
A Survey of different Data Hiding Techniques in Digital Images
PDF
Enhancement of Payload Capacity for Image Steganography based on LSB
PDF
Text in Image Hiding using Developed LSB and Random Method
PDF
O017429398
PDF
G017444651
PDF
A novel steganographic technique based on lsb dct approach by Mohit Goel
PDF
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
PPTX
analysis on concealing information within non secret data
PDF
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
PDF
Steganography
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
IRJET- Image Processing using Steganography
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
American standard code for information interchange mapping technique for tex...
Hide text depending on the three channels of pixels in color images using the...
A- Review On Image Steganography
Image Steganography V2 i11 0143
Securing Web Communication Using Three Layer Image Shielding
A Survey of Image Based Steganography
A Survey of different Data Hiding Techniques in Digital Images
Enhancement of Payload Capacity for Image Steganography based on LSB
Text in Image Hiding using Developed LSB and Random Method
O017429398
G017444651
A novel steganographic technique based on lsb dct approach by Mohit Goel
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
analysis on concealing information within non secret data
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Steganography

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Concealogram digital image in image using lsb insertion method

  • 1. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN INTERNATIONAL JOURNAL OF ELECTRONICS AND 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), pp. 230-235 IJECET © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2012): 3.5930 (Calculated by GISI) ©IAEME www.jifactor.com CONCEALOGRAM: DIGITAL IMAGE IN IMAGE USING LSB INSERTION METHOD Reena M Patel1, D J Shah2 1 EC department, LDRP Institute of Technology & Research, Near ITI, Sector 15, Gandhinagar, Gujarat, India, 2 Principal, L C institute of technology, Bhandu 384124, Gujarat, India, ABSTRACT In this paper, the authors propose a new algorithm for an image hiding steganographic method or concealing digital image in a cover image is introduced, and implemented. The proposed algorithm uses binary codes and pixels inside an image. For proposed paper author used spatial domain approach. The algorithm tested to see the viability of the proposed algorithm. Here using different algorithm, same sizes of data are stored inside the images and the PSNR (Peak signal-to-noise ratio) is also captured for each of the images tested. Various parameters like robustness against attack, data hiding capacity and quality of stego image are also considered. Hence this new steganography algorithm is very efficient to hide the digital image inside the image. Keywords: cover image, image processing, LSB insertion, Steganography, stegoimage 1. INTRODUCTION Steganography is the science of hiding information. The goal of steganography is to hide the information and be undetectable to human eyes. Steganography focuses on the means of communication and the development of a covert channel. Steganography focuses entirely on keeping the adversary completely unaware of the communication. There are several information hiding techniques, they could be classified according to the media where the information are hidden. First, Hiding in Text, methods such as line-shift coding, word shift coding, and feature coding are the commonly used methods to hide data in text. When using a text data as a host media, the embedded data are usually 230
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME codeword that are hidden within the text by altering their different textual features [1]. Second, data hiding in image, the least significant bit insertion method is a common simple approach for embedding information in image file. When applying LSB insertion method on each byte of a 24-bit image, three bits can be encoded into each pixel (because each pixel is represented by three bytes). Any changes in the pixel bits will be indiscernible to the human eye. When using LSB techniques on 8-bit color images (i.e., palate driven), more care need to be taken. So, for 8-bit images only the grey images are recommended for data hiding [2]. Three different aspects in information hiding systems contend with each other: capacity, security, and robustness. All steganographic methods have to comply be applied with a few basic requirements (i.e., invisibility, payload capacity, robustness against statistical attacks, robustness against image manipulation, independent of file format, and unsuspicious files [3]. 2. RELATED WORK Hiding data is the process of embedding information into digital content without causing perceptual degradation [4]. In data hiding, three famous techniques can be used. They are watermarking, steganography and cryptography. Steganography is defined as covering writing in Greek. It includes any process that deals with data or information within other data. According to Lou et al. [5], steganography is hiding the existence of a message by hiding information into various carriers. The major intent is to prevent the detection of hidden information. Research in steganography technique has been done back in ancient Greek where during that time the ancient Greek practice of tattooing a secret message on the shaved head of a messenger, and letting his hair grow back before sending him through enemy territory where the latency of this communications system was measured in months [6]. However, the majority of the development and use of computerized steganography only occurred in year 2000 [7]. There are several steganography techniques used for hiding data such as batch steganography, permutation stehanography, least significant bits (LSB), bit-plane complexity segmentation (BPCS) and chaos based spread spectrum image steganography (CSSIS). 3. PROPOSED METHODS FOR HIDING IMAGE IN IMAGE 3.1 4 bit data hiding method Each pixel contains 8 bits, the right most bit is Least Significant Bit (LSB) and left most bit is (Most Significant Bit) MSB. Four bit data hiding method, which embeds first four MSB bits (MSB,MSB-1,MSB-2,MSB-3) of secret image into last four LSB bits (LSB, LSB+1, LSB+2,LSB+3) of cover image. So last 4 bits of cover image is replace with first four bits of secret image. Now next pixel of cover image is taken and again 4 MSB bits of next pixel of secret image is inserted into 4 LSB bits of cover image. 231
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME Cover image Pixel 1 Pixel 2 Pixel 3 1 0 1 1 0 0 1 1 1 1 0 1 0 1 1 0 0 1 0 0 1 0 0 1 LS LS LS LS B+ B+ B+ B 3 2 1 Secret image Pixel 1 Pixel 2 Pixel 3 1 0 0 0 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 0 1 1 0 0 MS MS MS MS B B-1 B-2 B-3 Stego image Pixel 1 Pixel 2 Pixel 3 1 0 1 1 1 0 0 0 1 1 0 1 0 1 0 1 0 1 0 0 1 1 0 0 Fig.1. Data hiding process using 4 bit method In this method only 4 MSB bits of each pixel of secret image is considered. Because of Lower bits of pixel is not contain more information here we omit remaining four bits (LSB, LSB+1, LSB+2, LSB+3) of secret image. The data to be hidden is converted to binary form. In Fig.1 gray shad shows that the last 4 LSB bit of cover image is replace with first 4 MSB bits of secret image. Image processing fundamental said that (‘LSB contain less information’), so if we change LSB data it not disturb the quality of image. In proposed method we omit last 4 bits LSB of each Pixel from secret image. Now next pixel of cover image is taken for data hiding. The manipulation of the three bit alters the color of the pixel, but this manipulate change cannot easily be perceived by the human eye. 3.2 6 bit data hiding method Six bit data hiding method embeds first three MSB bits (MSB, MSB-1, MSB-2) of secret image into last three LSB bits (LSB, LSB+1, LSB+2) of cover image. Again three bits of secret image (MSB-3, MSB-4, MSB-5) is stored in 3 LSB bits of next pixel of cover image. So we are hiding total six MSB bits of secret image into cover image. Cover image embeds three bit data in each pixel byte. The data to be hidden is converted to binary form. In Fig.2 gray shad shows that the last 3 LSB bit of cover image is replace with first 3 MSB bits (1, 0, 0) of secret image. From MSB-3, next 3 bits (0, 0, 0) from Pixel 1 of Secret image is stored into 3 LSB bits of cover image Pixel 2. In proposed method we omit last 2bits LSB of each Pixel from secret image. 232
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME Cover image Pixel 1 Pixel 2 Pixel 3 1 0 1 1 0 0 1 1 1 1 0 1 0 1 1 0 0 1 0 0 1 0 0 1 LS LS LS B+ B+ B 2 1 Secret image Pixel 1 Pixel 2 Pixel 3 1 0 0 0 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 0 1 1 0 0 MS MS MS MS MS MS B B-1 B-2 B-3 B-4 B-5 Stego image Pixel 1 Pixel 2 Pixel 3 1 0 1 1 0 1 0 0 1 1 0 1 0 0 0 0 0 1 0 0 1 0 1 0 Fig.2. Data hiding process using 3 bit method 4. PSNR CALCULATION We then tested the algorithm using the PSNR (Peak signal-to-noise ratio). PSNR is a standard measurement used in steganograpy technique in order to test the quality of the stego images. The higher the value of PSNR, the more quality the stego image will have. If the cover image is C of size M × M and the stego image is S of size N × N, then each cover image C and stego image S will have pixel value (x, y) from 0 to M-1 and 0 to N-1 respectively. The PSNR is then calculated as follows: ࡾ૛ ∑ ሾࡵ ሺ࢓,࢔ሻିࡵ ሺ࢓,࢔ሻሿ૛ ࡼࡿࡺࡾ ൌ ૚૙ ‫ ܏ܗܔ‬૚૙ ቀࡹࡿࡱቁ Where ࡹࡿࡱ ൌ ࡹ,ࡺ ૚ ࡹ‫ ࡺכ‬૛ Note that R is the maximum possible pixel value of the images. For example, if the pixels are represented using 8 bits per sample, then the R value is 255. If the stego image has a higher PSNR value, then the stego image has more quality image. 5. RESULTS 5.1. 4 bit data hiding method Fig. 3 shows the application of this method. We have cover image as lena (size: 512x512) and secret image as cameraman (size: 256x256). Fig 3 shows stegno image after hidden image stored in cover image. We get index 143 (at location X=32, Y=100) for cover image while we get index 138 (at location X=32, Y=100) for stegno image i.e. index is changed. Also we get PSNR is equal to 38.41 dB. 233
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME Fig: 3 Four bit data Hiding Method Results 5.2. 6 bit data hiding method Fig: 4 Six bit data Hiding Method Results Fig 4 shows the application of this method. Once again we select lena as cover image and cameraman as secret image. And execute the algorithm. As shown in Fig 4 we get index 143 (at location X=32, Y=100) for cover image while we get index 141 (at location X=32, Y=100) for stegno image i.e. index is changed. Also we get PSNR is equal to 41.38 dB. We get better quality of stego image compare to 4 bit method since we are using 3 bits to embed data. Also the quality of received image is better than that of 4 bit method because 6 bits of original image is used instead of 4 bits. 234
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online) Volume 4, Issue 1, January- February (2013), © IAEME 6. CONCLUSION Results indicate that 6 bit data hiding method perform better than 4 bit data hiding method. We have less data hiding capacity in 6 bit data hiding method but at the same time we get better stego image & higher PSNR. When applying 6 bit data hiding method on each byte of a 24-bit image, nine bits can be encoded into each pixel (because each pixel is represented by three bytes). Also for 8-bit image, 3 bits can be encoded into each pixel. In this method any changes in the pixel bits will be barely visible to the human eye. REFERENCES [1] Jawad M. J., ”Hiding Audio Using Wavelet Transform”,M.Sc. thesis, college of science, Al-Nahrain University, Iraq, 2005. [2] Kessler G. C., “Hiding Data Within Data”, paper, Champlain College in Burlington, 2001. http://www.garykessler.net/library/steganography.html [3] Morkel T., Eloff J. H. P., and Olivier M. S., “An Overview of Image Steganography”, Information and Computer Security Architecture (ICSA) Research Group, University of Pretoria, South Africa, 2005. [4] M. Chen, N. Memon, E.K. Wong, Data hiding in document images, in: H. Nemati (Ed.). Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450. [5] D.C. Lou, J.L. Liu, H.K. Tso, Evolution of information – hiding technology, in H. Nemati (Ed.), Premier Reference Source–Information Security and Ethics: Concepts, Methodologies, Tools and Applications, New York: Information Science Reference, 2008, pp. 438-450. [6] Schneider, Secrets & Lies, Indiana:Wiley Publishing, 2000. [7] E. Cole, Hiding in Plain Sight: Steganography and the Art of Covert Communication, Indianapolis: Wiley Publishing, 2003. [8] Nagham Hamid, Abid Yahya ,R. Badlishah Ahmad and Osamah M. Al-Qershi, “An Improved Robust And Secured Image Steganographic Scheme” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 3, Issue 3, 2012, pp. 22 - 33, Published by IAEME. [9] R. Pushpavalli and G.Sivaradjei, “Nonlinear Filtering Technique For Preserving Edges and Fine Details of Digital Images” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 3, Issue 1, 2012, pp. 29-40, Published by IAEME. [10] Ankit Vidyarthi and Ankita Kansal, “A Survey Report On Digital Images Segmentation Algorithms” International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 85 - 91, Published by IAEME. [11] Miss. Vismita Nagrale, Mr. Ganesh Zambre and Mr. Aamir Agwani, “Image Stegano- Cryptography Based on LSB Insertion & Symmetric Key Encryption” International journal of Electronics and Communication Engineering &Technology (IJECET), Volume 2, Issue 1, 2011, pp. 35-42, Published by IAEME. 235