SlideShare a Scribd company logo
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
DOI:10.5121/ijcsit.2014.6614 169
EXPERIMENTAL ANALYSIS OF MATCHING
TECHNIQUE OF STEGANOGRAPHY FOR GREYSCALE
AND COLOUR IMAGE
Khurrum Rahim Rashid#1
, Aqsa Rashid*2
, Nadeem Salamat#3
and Saad Missen#4
#1
Department of Electrical Engineering, NUSES FAST, Pakistan
#2,4
Department of CS&IT, Islamia University Bahawalpur, Pakistan
#3
Department of Mathematics & Statistics, Karakoram International University Gilgit,
Gilgit-Biltastan
ABSTRACT
Steganography and steganalysis are vital matter in information hiding. Steganography refers to the
technology of hiding data into digital media without depiction of any misgiving, while steganalysis is the
detection of the existence of steganography. In this paper, the impact of sequential matching method for
every possible location in pixel is analyzed experimentally. After matching the steganalysis is check by
image quality measures (IQM) and Statistics, Histogram Analysis and visual attack. This analysis provides
comprehensive study and understanding of basic matching technique and is helpful for those who want to
work in the field of image steganography.
KEYWORDS
Stagnography, Least significant bit, Matching, Statistical trial for comparison.
I. INTRODUCTION
Steganography has established significant attention during the last decade, in particular after
anecdotal news suspected that this tool was used by terrorist. Steganography [2, 3] inquire about
to make available a clandestine message control between two parties. The data that are passing on
through internet persistently have possibility of third individual nosy. So there should be some
criteria to keep information covert today as the current time is of digital contact. There are various
steganography technique and medium used for this purpose [1][4][5][8]. These methods are
gaining value due to the secret communication over the internet.
In sequential matching method, the pixel value is incremented or decremented to match the
message and pixel bit. The process of matching keep on until the length of the message bits
becomes zero. This can be applied on both the greyscale and colour image.
The paper is arranged as Section II describes the method of matching, Section III discuss the
steganalysis, section IV gives experimental results and discussion, section V describes conclusion
II. METHOD
Matching steps for matching LSB Stego-method are:
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
170
So that
Contain the message bits. It first takes the pixel of the image and its value. If
matching bit and are now the same, then nothing to be done, but if they are dissimilar
then increment or decrement in in such a way that the become the matching bit. This
process goes on even as is not zero.
Extracting steps for sequential matching Stego-method
The is the total number of pixels of supposed image. Run the loop in place of . This
is because the embedding is different from the retrieval process. We just recover the LSB value of
each pixel in and translate this to ASCII; the message will be understandable and in readable
format up to the point that the message was embedded, and will then come into view as claptrap
when we are see the LSBs of the image data. If we know the length of the message that was
embedded, then the loop will be ended when the length of message is completed and only the
message will be retrieved i.e., no gibberish will be seen at the end of the message.
III. STEGANALYSIS
This part deals with the steganalysis of the matching techniques. It is divided into three
subsections. First deals with Steganalysis by Image Quality measures [6], Histogram, second
deals with Steganalysis by Histogram Analysis and third is Steganalysis by Bit Planes Analysis
(Visual Attack).
Image Quality Measure
In the paper four most important and widely used Image quality measures [7, 9, 10, 11, 12]
namely MSE, PSNR, UIQI and SSIM are computed for steganalysis. Mean Square Error (MSE)
computes the perceived error. It is pixel value difference based quality measure. Peak Signal to
Noise Ratio (PSNR) [10] is inversely proportional to MSE. Less MSE gives High PSNR which is
the proof of the fact that image has good quality.
Universal Image Quality Index split the judgment of similarity between Cover Image (CI) and
Stego-Image (SI) into three comparisons: Luminance, Contrast and Structural Information.
SSIM estimates “Perceived change in structural information”. It computes the similarity between
two images of common size. Its mathematical definition is as:
The value of UIQI and SSIM varies between 1 and -1. Closer the highest positive value denotes
too much less change in two images and -1 shows totally mismatch. The UIQI and SSIM are
considered as more consistent and accurate than MSE and PSNR.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
171
A. Histogram Analysis
Each bin of the histogram represents the number of pixels, which have the value represented
by that bin. After LSB matching the local maxima of the histogram of images will decrease and
the local minima will increase. Figure 1 (a) is the histogram of cover image and (b) shows the
histogram of stego-image.
Fig.1 (a) Histogram of Cover Image (b) Histogram of Stego-image
For histogram analysis Jaccard measure, Correlation, Chi-square, Intersection and
Bhattacharya distance [6] are computed between the histogram of cover image and stego-image.
All these comparisons are performed on normalized histogram. The correlation value varies
between 1 and -1. Perfect match is 1 and total mismatch is -1. For Chi-square ideal value is 0 and
mismatch value is unbound, for intersection 1 is ideal matching value and 0 is mismatched value
and Bhattacharya distance gives 0 for the exact match and 1 for mismatch. When these
comparison matrices gives ideal values or values that are closer to ideal values then the change in
histogram is very least and this is the evidence for Stego-System to be a secure system.
B. Visual Attack
Figure 2 shows the concept of bit planes for the greyscale images. In image steganography
visual hit distinguish whether or not a hypothetical image has been subjected to LSB matching
steganography, the steganalyst will be looking to obtain a visual inconsistency that will
successfully point out signs of embedding. Figure 3 shows the possibility of matching sequence
and effect of matching sequence on the bit plan.
Fig.2 Bit Plan Concept
IV. EXPERIMENTAL RESULTS AND DISCUSSION
The first part of this section includes the experimental results and discussion for the greyscale
image and second part extend it for colour images.
Greyscale Images: First of all, we compare the perceptual impact of the image after hiding
secret information. Secondly, impact on the image by statistical measures is compared. Then
histogram analysis is performed and finally, visual attack by inspecting all bit plans of image is
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
172
performed. First of all, experiments are performed for the greyscale images. In the next example,
we extend our results for the colour images.
Fig 3 (a) is the original greyscale image, (b) is the histogram of the greyscale cover
image that shows the minimum and maximum pixel value respectively, present in cover image
and number of pixels having same colour and (c-j) are the bit plans of Cover image. Table I
shows the results of Steganalysis by IQM. Table II shows the results of Histogram analysis. Fig 5
shows the bit plans of 0th (most significant bit MSB) to 7th (least significant bit LSB) bit stego-
images.
Fig 3 (a) Cover Image (b) Histogram of Cover Image (c-j) Bit plan of Cover Image
Fig 4 (a-h) 0th
(MSB) to 7th
(LSB) Bit Stego-Images
TABLE I Result of iqm for Gray scale Images
QM 0th
Bit 1st
Bit 2nd
Bit 3rd
Bit 4th
Bit 5th
Bit 6th
Bit 7th
Bit
MSE
676.3378
1
181.9650
9 50.76132
12.6359
8 3.77189 1.21497 0.49875 0.49449
PSNR 19.8388825.53092 31.075476
37.1147
2 42.36521
47.2851
4 51.15346 51.18917
NCC 0.96769 0.99999 0.99999 0.99999 0.99999 1 1 1
UIQI 0.66737 0.93663 0.98135 0.99529 0.99859 0.99955 0.99964 0.999815
SSIM 0.66612 0.93646 0.98129 0.99529 0.99859 0.99955 0.99981 0.99992
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
173
TABLE II RESULT OF HISTOGRAM COMPARISON FOR GREYSCALE IMAGES
H-comp 0th
Bit 1st
Bit 2nd
Bit 3rd
Bit 4th
Bit 5th
Bit 6th
Bit 7th
Bit
Jaccard 0.95871 0.98901 0.99688
0.9992
2 0.99977 0.99993 0.99997 0.99997
Intersection 0.94437 0.97109 0.98207
0.9909
4 0.99485 0.99698 0.99797 0.99776
Correlation 0.70408 0.93818 0.98142
0.9952
9 0.99859 0.99955 0.99981 0.99981
Chi-square 2.75833 0.74162 0.20791
0.0517
7 0.01545 0.00498 0.00203 0.00204
Bhattachary
a 0.08158 0.04345 0.02321
0.0121
4 0.00694 0.00415 0.00277 0.00250
Figure 5 ( a-h) Bit plans of 0th
to 7th
Bit Stego-image
Colour Image: This section is extension of experimental results and discussion to colour images.
Fig 6 (a) is the original RGB cover image having 34,645 pixels in pixel data (b) is the histogram
of the RGB cover image that shows the minimum pixel value, maximum pixel value present in
cover image and maximum number of pixels having same colour.(c),(d) and (e) are the channel
based histogram of the RGB cover image. All the experimental results for RGB images are shown
after replacing 96064 bits of RGB cover image.Fig.7 (a-c) shows the RGB bit plan of colour
image of Fig 6 (a).
Fig 8(a-h) are the 0th
to 7th
bit stego-images. Fig 9 to Fig 16 is the 0th
to 7th
bit RGB Bit
plans of stego-images. Table III shows the result of IQM for colour image. Table IV shows the
result of histogram comparison.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
174
Fig 6 (a) Cover image (b) Histogram of Cover image(c-e) Channel Based Histogram of Cover image
Fig 7 (a-c) Bit plans of RGB channel of Cover Image
Fig 8 (a-h) 0th
to 7th
Bit Stego-images
TABLE III Result of Iqm for colour images
IQM 0th
Bit 1st
Bit 2nd
Bit 3rd
Bit 4th
Bit 5th
Bit 6th
Bit 7th
Bit
MSE
2687.5041
6
342.7982
9 50.06137 12.03452 3.43584 0.99917 0.46127 0.46088
PSNR 13.84529 22.56285 30.81184 37.51692
42.7459
9 48.03016
51.4936
5
51.5100
3
NCC 0.99246 0.99254 0.99259 0.99278 0.99954 1 1
UIQI 0.33915 0.83143 0.97505 0.99405 0.99829 0.99950 0.99977 0.99977
SSIM 0.34085 0.83208 0.97514 0.99407 0.99830 0.999507 0.99977 0.99977
TABLE IV Result of histogram comparison for colour images
H-comp 0th
Bit 1st
Bit 2nd
Bit 3rd
Bit 4th
Bit 5th
Bit 6th
Bit 7th
Bit
Jaccard 0.66618 0.92576 0.98811 0.99711 0.99917 0.99976 0.99989 0.99989
Intersection 0.99163 0.96342 0.97102 0.98079 0.98995 0.99455 0.99588 0.99544
Correlation 0.40984 0.83169 0.97349 0.99466 0.99836 0.99951 0.99781 0.99985
Chi-square 12.75833 2.89087 0.44306 0.10753 0.03067 0.00892 0.00412 0.00412
Bhattyacharya 0.20944 0.12181 0.05473 0.02694 0.01448 0.00764 0.00532 0.00534
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
175
Fig 9 (a-c) RGB Bit plans of 0th
Bit Stego-image
Fig 10 (a-c) RGB Bit plans of 1st
Bit Stego-image
Fig 11 (a-c) RGB Bit plans of 2nd
Bit Stego-image
Fig 12 (a-c) RGB Bit plans of 3rd
Bit Stego-image
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
176
Fig 13 (a-c) RGB Bit plans of 4th
Bit Stego-image
Fig 14 (a-c) RGB Bit plans of 5th
Bit Stego-image
Fig 15 (a-c) RGB Bit plans of 6th
Bit Stego-image
Fig 16 (a-c) RGB Bit plans of 7th
Bit Stego-image
Perceptual appearance of stego-images in first two bits 0th
bit and 2nd
bit is very poor. And
change in histogram is also at great extinct for those stego-images. However improvement occurs
after 4th
bit. Table I and III shows the results of MSE, PSNR, NCC, UIQI and SSIM for the
greyscale and colour images. The greater the value of MSE and lesser PSNR means that
perceived error is high. NCC, UIQI and SSIM closer to 1 means that perceived change in
structural information is very less and 1 means identical images. And Table V shows the change
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
177
in pixel value. This is least for 7th
bit and increases as move towards 0th
bit. All these results are
the answer of the question that Why data is hidden only in the LSB of the pixel.
TABLE V Change in value of pixel after matching
Bit Location Maximum Minimum
7th
(LSB)Bit Increment/Decrement by 1 No change
6th
Bit Increment/Decrement by 2 No change
5th
Bit Increment/Decrement by 4 No change
4th
Bit Increment/Decrement by 8 No change
3rd
Bit Increment/Decrement by 16 No change
2nd
Bit Increment/Decrement by 32 No change
1st
Bit Increment/Decrement by 64 No change
0th
(M
SB)Bit Increment/Decrement by 128 No change
V. CONCLUSION
Image LSB matching steganography for every bit of pixel is critically analyzed after inserting
message bits in all location of image bits. Perceptual appearance is poor in most three significant
bits and remaining are good. Steganalysis is very easy for most significant bits. Perfect results of
image quality methods require identical images. MSB of the image contain most important
information. So change to that will give poor results of image quality measure. However as we
move from MSB to LSB results becomes good. This paper also discusses the important quality
evaluation methods and attacks on LSB matching. This analysis could be very helpful for those
who want to work in the field of steganography.
REFERENCES
[1] N.F.Johnson, Sushil Jojadia George Mason University, “Exploring Steganography: Seeing the
Unseen”, (0018-916/98/$10.00©) 1998 IEEE
[2] R.Poornima, R.J.Iswarya, “An Overview of Digital Image Steganography”, International Journal of
Computer Science & Engineering Survey (Vol.4, No 1),February 2013
[3] T.Morkel, T.H.P.Eloff, M.S.Olivier, “An Overview of Image Steganography”, ICSA Research Group,
Department of Computer Science.
[4] Jammi Ashok, Y.Raju, S.Munishankaralak, K.Srinivas, Jammi Ashok, “Steganography: An
Overview”, et.01./International Journal of Engineering Science and Technology, (Vol.2(10)), 2010,
5985-5992
[5] Shikha Sharda, Sumit Budhiraja , “Image Steganography:A Review”, International Journal of
Emerging Technology and Advance Engineering (volume 3, Issue 1), January 2013
[6] V. Asha, P. Nagabhushan, N. U. Bhajantri, “Similarity Measures for Automatic Defect Detection on
Patterned Textures”, International Journal of Image Processing and Vision Sciences (IJIPVS)
Volume-1 Issue-1, 2012
[7] Rajkumar Yadav, “Analysis of Various Image Steganography Techniques Based Upon PSNR
Metric”, International Journal of P2P Network Trends and Technology- (Volume1, Issue2)- 2011,
ISSN: 2249-2615
[8] M. Pavani, S. Naganjaneyulu, C. Nagaraju, “ A Survey on LSB Based Steganography Methods”,
International Journal Of Engineering And Computer Science ISSN: 2319-7242 (Volume 2 Issue 8)
August, 2013 Page No. 2464-2467
[9] Ismail Avcibas, Bulent Sankur, Khalid Sayood, “Statistical Evaluation of Image Quality Measure”,
Journal of Electronic Imaging, 11(2), 206-223(April 2002)
[10] Zhou Wang, Member,Hamid R. Sheikh, “Image Quality Assessment: From Error Visibility to
Structural Similarity”, IEEE Transactions On Image Processing, (VOL. 13, NO. 4), APRIL 2004 1
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
178
[11] Yousra A. Y. Al. Najjar, Dr. D. C. Soong, “Comparison of image quality assessment: PSNR, HVS,
UIQI, SSIM”, IJSER, (Vol. 3, Issue8), August-2012. ISSN2229-5518
[12] Amhamed Saffor, Abdul Rahman Ramli, Kwan-Hoong Ng, “A Comparative Study Of Image
Compression Between Jpeg And Wavelet”, Malaysian Journal of Computer Science, (Vol. 14 No. 1),
June 2001, pp. 39-45.

More Related Content

PDF
Modified weighted embedding method for image steganography
PDF
Steganography based on random pixel selection for efficient data hiding 2
PDF
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
PDF
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
PDF
Efficient & Secure Data Hiding Using Secret Reference Matrix
PDF
Visual cryptography scheme for color images
PDF
Fuzzy entropy based optimal
PDF
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
Modified weighted embedding method for image steganography
Steganography based on random pixel selection for efficient data hiding 2
USING BIAS OPTIMIAZATION FOR REVERSIBLE DATA HIDING USING IMAGE INTERPOLATION
INTRA BLOCK AND INTER BLOCK NEIGHBORING JOINT DENSITY BASED APPROACH FOR JPEG...
Efficient & Secure Data Hiding Using Secret Reference Matrix
Visual cryptography scheme for color images
Fuzzy entropy based optimal
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE

What's hot (18)

PDF
F0343545
PDF
One dimensional vector based pattern
PDF
1. updated document ed sat
PDF
D0341829
PDF
Chaos Image Encryption using Pixel shuffling
PDF
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
PDF
Selective image encryption using
PDF
A novel secure image steganography method based on chaos theory in spatial do...
PDF
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
PDF
RC4 Technique in Visual Cryptography
PDF
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
PDF
The Comparative Study on Visual Cryptography and Random Grid Cryptography
PDF
Ieee a secure algorithm for image based information hiding with one-dimension...
PDF
Digital image compression techniques
PDF
Ijnsa050205
PDF
Encryption-Decryption RGB Color Image Using Matrix Multiplication
PDF
Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...
PDF
Double layer security using visual cryptography and transform based steganogr...
F0343545
One dimensional vector based pattern
1. updated document ed sat
D0341829
Chaos Image Encryption using Pixel shuffling
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
Selective image encryption using
A novel secure image steganography method based on chaos theory in spatial do...
Fuzzy Type Image Fusion Using SPIHT Image Compression Technique
RC4 Technique in Visual Cryptography
A CHAOTIC CONFUSION-DIFFUSION IMAGE ENCRYPTION BASED ON HENON MAP
The Comparative Study on Visual Cryptography and Random Grid Cryptography
Ieee a secure algorithm for image based information hiding with one-dimension...
Digital image compression techniques
Ijnsa050205
Encryption-Decryption RGB Color Image Using Matrix Multiplication
Incorporating Index of Fuzziness and Adaptive Thresholding for Image Segmenta...
Double layer security using visual cryptography and transform based steganogr...
Ad

Viewers also liked (10)

PDF
The Impact of Frequent Use Email When Creating Account at the Websites on the...
PDF
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...
PPTX
Vyhledávače zboží 2014: Pricemania
PDF
Distributed fault tolerant event
PDF
Design and implementation of a personal super Computer
PDF
Handover management scheme in LTE FEMTOCELL networks
DOC
Top 7 logistics coordinator interview questions answers
PDF
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
DOC
Top 7 legal secretary interview questions answers
PDF
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
The Impact of Frequent Use Email When Creating Account at the Websites on the...
R ESEARCH ON D ECISION M AKING R EGARDING H IGH - BUSINESS - STRATEGY C ...
Vyhledávače zboží 2014: Pricemania
Distributed fault tolerant event
Design and implementation of a personal super Computer
Handover management scheme in LTE FEMTOCELL networks
Top 7 logistics coordinator interview questions answers
T OWARDS A S YSTEM D YNAMICS M ODELING M E- THOD B ASED ON DEMATEL
Top 7 legal secretary interview questions answers
TWO-LAYER SECURE PREVENTION MECHANISM FOR REDUCING E-COMMERCE SECURITY RISKS
Ad

Similar to Experimental analysis of matching technique of steganography for greyscale and colour image (20)

PDF
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
PDF
Quick Identification of Stego Signatures in Images Using Suspicion Value (Sp...
PDF
Identification of Steganographic Signatures in Stego Images Generated By Dis...
PDF
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
PDF
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
PDF
A new image steganography algorithm based
PDF
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
PDF
Vol 14 No 1 - July 2014
PDF
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
PDF
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...
PDF
4 image steganography combined with des encryption pre processing
PDF
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
PDF
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
PDF
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
PDF
L045056469
PDF
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
PDF
Reference-free differential histogram-correlative detection of steganography:...
PDF
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
PDF
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
PDF
Influence of local segmentation in the context of digital image processing
Steganalysis of LSB Embedded Images Using Gray Level Co-Occurrence Matrix
Quick Identification of Stego Signatures in Images Using Suspicion Value (Sp...
Identification of Steganographic Signatures in Stego Images Generated By Dis...
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
MINIMIZING DISTORTION IN STEGANOG-RAPHY BASED ON IMAGE FEATURE
A new image steganography algorithm based
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
Vol 14 No 1 - July 2014
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
Intra Block and Inter Block Neighboring Joint Density Based Approach for Jpeg...
4 image steganography combined with des encryption pre processing
Fuzzy Entropy Based Optimal Thresholding Technique for Image Enhancement
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
IRJET- Encryption based Approach to Find Fake Uploaders in Social Media
L045056469
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
Reference-free differential histogram-correlative detection of steganography:...
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
Influence of local segmentation in the context of digital image processing

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPT
Project quality management in manufacturing
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Digital Logic Computer Design lecture notes
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Well-logging-methods_new................
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Geodesy 1.pptx...............................................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
OOP with Java - Java Introduction (Basics)
additive manufacturing of ss316l using mig welding
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Project quality management in manufacturing
CH1 Production IntroductoryConcepts.pptx
R24 SURVEYING LAB MANUAL for civil enggi
Digital Logic Computer Design lecture notes
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Well-logging-methods_new................
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Foundation to blockchain - A guide to Blockchain Tech
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Embodied AI: Ushering in the Next Era of Intelligent Systems
Geodesy 1.pptx...............................................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
OOP with Java - Java Introduction (Basics)

Experimental analysis of matching technique of steganography for greyscale and colour image

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 DOI:10.5121/ijcsit.2014.6614 169 EXPERIMENTAL ANALYSIS OF MATCHING TECHNIQUE OF STEGANOGRAPHY FOR GREYSCALE AND COLOUR IMAGE Khurrum Rahim Rashid#1 , Aqsa Rashid*2 , Nadeem Salamat#3 and Saad Missen#4 #1 Department of Electrical Engineering, NUSES FAST, Pakistan #2,4 Department of CS&IT, Islamia University Bahawalpur, Pakistan #3 Department of Mathematics & Statistics, Karakoram International University Gilgit, Gilgit-Biltastan ABSTRACT Steganography and steganalysis are vital matter in information hiding. Steganography refers to the technology of hiding data into digital media without depiction of any misgiving, while steganalysis is the detection of the existence of steganography. In this paper, the impact of sequential matching method for every possible location in pixel is analyzed experimentally. After matching the steganalysis is check by image quality measures (IQM) and Statistics, Histogram Analysis and visual attack. This analysis provides comprehensive study and understanding of basic matching technique and is helpful for those who want to work in the field of image steganography. KEYWORDS Stagnography, Least significant bit, Matching, Statistical trial for comparison. I. INTRODUCTION Steganography has established significant attention during the last decade, in particular after anecdotal news suspected that this tool was used by terrorist. Steganography [2, 3] inquire about to make available a clandestine message control between two parties. The data that are passing on through internet persistently have possibility of third individual nosy. So there should be some criteria to keep information covert today as the current time is of digital contact. There are various steganography technique and medium used for this purpose [1][4][5][8]. These methods are gaining value due to the secret communication over the internet. In sequential matching method, the pixel value is incremented or decremented to match the message and pixel bit. The process of matching keep on until the length of the message bits becomes zero. This can be applied on both the greyscale and colour image. The paper is arranged as Section II describes the method of matching, Section III discuss the steganalysis, section IV gives experimental results and discussion, section V describes conclusion II. METHOD Matching steps for matching LSB Stego-method are:
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 170 So that Contain the message bits. It first takes the pixel of the image and its value. If matching bit and are now the same, then nothing to be done, but if they are dissimilar then increment or decrement in in such a way that the become the matching bit. This process goes on even as is not zero. Extracting steps for sequential matching Stego-method The is the total number of pixels of supposed image. Run the loop in place of . This is because the embedding is different from the retrieval process. We just recover the LSB value of each pixel in and translate this to ASCII; the message will be understandable and in readable format up to the point that the message was embedded, and will then come into view as claptrap when we are see the LSBs of the image data. If we know the length of the message that was embedded, then the loop will be ended when the length of message is completed and only the message will be retrieved i.e., no gibberish will be seen at the end of the message. III. STEGANALYSIS This part deals with the steganalysis of the matching techniques. It is divided into three subsections. First deals with Steganalysis by Image Quality measures [6], Histogram, second deals with Steganalysis by Histogram Analysis and third is Steganalysis by Bit Planes Analysis (Visual Attack). Image Quality Measure In the paper four most important and widely used Image quality measures [7, 9, 10, 11, 12] namely MSE, PSNR, UIQI and SSIM are computed for steganalysis. Mean Square Error (MSE) computes the perceived error. It is pixel value difference based quality measure. Peak Signal to Noise Ratio (PSNR) [10] is inversely proportional to MSE. Less MSE gives High PSNR which is the proof of the fact that image has good quality. Universal Image Quality Index split the judgment of similarity between Cover Image (CI) and Stego-Image (SI) into three comparisons: Luminance, Contrast and Structural Information. SSIM estimates “Perceived change in structural information”. It computes the similarity between two images of common size. Its mathematical definition is as: The value of UIQI and SSIM varies between 1 and -1. Closer the highest positive value denotes too much less change in two images and -1 shows totally mismatch. The UIQI and SSIM are considered as more consistent and accurate than MSE and PSNR.
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 171 A. Histogram Analysis Each bin of the histogram represents the number of pixels, which have the value represented by that bin. After LSB matching the local maxima of the histogram of images will decrease and the local minima will increase. Figure 1 (a) is the histogram of cover image and (b) shows the histogram of stego-image. Fig.1 (a) Histogram of Cover Image (b) Histogram of Stego-image For histogram analysis Jaccard measure, Correlation, Chi-square, Intersection and Bhattacharya distance [6] are computed between the histogram of cover image and stego-image. All these comparisons are performed on normalized histogram. The correlation value varies between 1 and -1. Perfect match is 1 and total mismatch is -1. For Chi-square ideal value is 0 and mismatch value is unbound, for intersection 1 is ideal matching value and 0 is mismatched value and Bhattacharya distance gives 0 for the exact match and 1 for mismatch. When these comparison matrices gives ideal values or values that are closer to ideal values then the change in histogram is very least and this is the evidence for Stego-System to be a secure system. B. Visual Attack Figure 2 shows the concept of bit planes for the greyscale images. In image steganography visual hit distinguish whether or not a hypothetical image has been subjected to LSB matching steganography, the steganalyst will be looking to obtain a visual inconsistency that will successfully point out signs of embedding. Figure 3 shows the possibility of matching sequence and effect of matching sequence on the bit plan. Fig.2 Bit Plan Concept IV. EXPERIMENTAL RESULTS AND DISCUSSION The first part of this section includes the experimental results and discussion for the greyscale image and second part extend it for colour images. Greyscale Images: First of all, we compare the perceptual impact of the image after hiding secret information. Secondly, impact on the image by statistical measures is compared. Then histogram analysis is performed and finally, visual attack by inspecting all bit plans of image is
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 172 performed. First of all, experiments are performed for the greyscale images. In the next example, we extend our results for the colour images. Fig 3 (a) is the original greyscale image, (b) is the histogram of the greyscale cover image that shows the minimum and maximum pixel value respectively, present in cover image and number of pixels having same colour and (c-j) are the bit plans of Cover image. Table I shows the results of Steganalysis by IQM. Table II shows the results of Histogram analysis. Fig 5 shows the bit plans of 0th (most significant bit MSB) to 7th (least significant bit LSB) bit stego- images. Fig 3 (a) Cover Image (b) Histogram of Cover Image (c-j) Bit plan of Cover Image Fig 4 (a-h) 0th (MSB) to 7th (LSB) Bit Stego-Images TABLE I Result of iqm for Gray scale Images QM 0th Bit 1st Bit 2nd Bit 3rd Bit 4th Bit 5th Bit 6th Bit 7th Bit MSE 676.3378 1 181.9650 9 50.76132 12.6359 8 3.77189 1.21497 0.49875 0.49449 PSNR 19.8388825.53092 31.075476 37.1147 2 42.36521 47.2851 4 51.15346 51.18917 NCC 0.96769 0.99999 0.99999 0.99999 0.99999 1 1 1 UIQI 0.66737 0.93663 0.98135 0.99529 0.99859 0.99955 0.99964 0.999815 SSIM 0.66612 0.93646 0.98129 0.99529 0.99859 0.99955 0.99981 0.99992
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 173 TABLE II RESULT OF HISTOGRAM COMPARISON FOR GREYSCALE IMAGES H-comp 0th Bit 1st Bit 2nd Bit 3rd Bit 4th Bit 5th Bit 6th Bit 7th Bit Jaccard 0.95871 0.98901 0.99688 0.9992 2 0.99977 0.99993 0.99997 0.99997 Intersection 0.94437 0.97109 0.98207 0.9909 4 0.99485 0.99698 0.99797 0.99776 Correlation 0.70408 0.93818 0.98142 0.9952 9 0.99859 0.99955 0.99981 0.99981 Chi-square 2.75833 0.74162 0.20791 0.0517 7 0.01545 0.00498 0.00203 0.00204 Bhattachary a 0.08158 0.04345 0.02321 0.0121 4 0.00694 0.00415 0.00277 0.00250 Figure 5 ( a-h) Bit plans of 0th to 7th Bit Stego-image Colour Image: This section is extension of experimental results and discussion to colour images. Fig 6 (a) is the original RGB cover image having 34,645 pixels in pixel data (b) is the histogram of the RGB cover image that shows the minimum pixel value, maximum pixel value present in cover image and maximum number of pixels having same colour.(c),(d) and (e) are the channel based histogram of the RGB cover image. All the experimental results for RGB images are shown after replacing 96064 bits of RGB cover image.Fig.7 (a-c) shows the RGB bit plan of colour image of Fig 6 (a). Fig 8(a-h) are the 0th to 7th bit stego-images. Fig 9 to Fig 16 is the 0th to 7th bit RGB Bit plans of stego-images. Table III shows the result of IQM for colour image. Table IV shows the result of histogram comparison.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 174 Fig 6 (a) Cover image (b) Histogram of Cover image(c-e) Channel Based Histogram of Cover image Fig 7 (a-c) Bit plans of RGB channel of Cover Image Fig 8 (a-h) 0th to 7th Bit Stego-images TABLE III Result of Iqm for colour images IQM 0th Bit 1st Bit 2nd Bit 3rd Bit 4th Bit 5th Bit 6th Bit 7th Bit MSE 2687.5041 6 342.7982 9 50.06137 12.03452 3.43584 0.99917 0.46127 0.46088 PSNR 13.84529 22.56285 30.81184 37.51692 42.7459 9 48.03016 51.4936 5 51.5100 3 NCC 0.99246 0.99254 0.99259 0.99278 0.99954 1 1 UIQI 0.33915 0.83143 0.97505 0.99405 0.99829 0.99950 0.99977 0.99977 SSIM 0.34085 0.83208 0.97514 0.99407 0.99830 0.999507 0.99977 0.99977 TABLE IV Result of histogram comparison for colour images H-comp 0th Bit 1st Bit 2nd Bit 3rd Bit 4th Bit 5th Bit 6th Bit 7th Bit Jaccard 0.66618 0.92576 0.98811 0.99711 0.99917 0.99976 0.99989 0.99989 Intersection 0.99163 0.96342 0.97102 0.98079 0.98995 0.99455 0.99588 0.99544 Correlation 0.40984 0.83169 0.97349 0.99466 0.99836 0.99951 0.99781 0.99985 Chi-square 12.75833 2.89087 0.44306 0.10753 0.03067 0.00892 0.00412 0.00412 Bhattyacharya 0.20944 0.12181 0.05473 0.02694 0.01448 0.00764 0.00532 0.00534
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 175 Fig 9 (a-c) RGB Bit plans of 0th Bit Stego-image Fig 10 (a-c) RGB Bit plans of 1st Bit Stego-image Fig 11 (a-c) RGB Bit plans of 2nd Bit Stego-image Fig 12 (a-c) RGB Bit plans of 3rd Bit Stego-image
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 176 Fig 13 (a-c) RGB Bit plans of 4th Bit Stego-image Fig 14 (a-c) RGB Bit plans of 5th Bit Stego-image Fig 15 (a-c) RGB Bit plans of 6th Bit Stego-image Fig 16 (a-c) RGB Bit plans of 7th Bit Stego-image Perceptual appearance of stego-images in first two bits 0th bit and 2nd bit is very poor. And change in histogram is also at great extinct for those stego-images. However improvement occurs after 4th bit. Table I and III shows the results of MSE, PSNR, NCC, UIQI and SSIM for the greyscale and colour images. The greater the value of MSE and lesser PSNR means that perceived error is high. NCC, UIQI and SSIM closer to 1 means that perceived change in structural information is very less and 1 means identical images. And Table V shows the change
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 177 in pixel value. This is least for 7th bit and increases as move towards 0th bit. All these results are the answer of the question that Why data is hidden only in the LSB of the pixel. TABLE V Change in value of pixel after matching Bit Location Maximum Minimum 7th (LSB)Bit Increment/Decrement by 1 No change 6th Bit Increment/Decrement by 2 No change 5th Bit Increment/Decrement by 4 No change 4th Bit Increment/Decrement by 8 No change 3rd Bit Increment/Decrement by 16 No change 2nd Bit Increment/Decrement by 32 No change 1st Bit Increment/Decrement by 64 No change 0th (M SB)Bit Increment/Decrement by 128 No change V. CONCLUSION Image LSB matching steganography for every bit of pixel is critically analyzed after inserting message bits in all location of image bits. Perceptual appearance is poor in most three significant bits and remaining are good. Steganalysis is very easy for most significant bits. Perfect results of image quality methods require identical images. MSB of the image contain most important information. So change to that will give poor results of image quality measure. However as we move from MSB to LSB results becomes good. This paper also discusses the important quality evaluation methods and attacks on LSB matching. This analysis could be very helpful for those who want to work in the field of steganography. REFERENCES [1] N.F.Johnson, Sushil Jojadia George Mason University, “Exploring Steganography: Seeing the Unseen”, (0018-916/98/$10.00©) 1998 IEEE [2] R.Poornima, R.J.Iswarya, “An Overview of Digital Image Steganography”, International Journal of Computer Science & Engineering Survey (Vol.4, No 1),February 2013 [3] T.Morkel, T.H.P.Eloff, M.S.Olivier, “An Overview of Image Steganography”, ICSA Research Group, Department of Computer Science. [4] Jammi Ashok, Y.Raju, S.Munishankaralak, K.Srinivas, Jammi Ashok, “Steganography: An Overview”, et.01./International Journal of Engineering Science and Technology, (Vol.2(10)), 2010, 5985-5992 [5] Shikha Sharda, Sumit Budhiraja , “Image Steganography:A Review”, International Journal of Emerging Technology and Advance Engineering (volume 3, Issue 1), January 2013 [6] V. Asha, P. Nagabhushan, N. U. Bhajantri, “Similarity Measures for Automatic Defect Detection on Patterned Textures”, International Journal of Image Processing and Vision Sciences (IJIPVS) Volume-1 Issue-1, 2012 [7] Rajkumar Yadav, “Analysis of Various Image Steganography Techniques Based Upon PSNR Metric”, International Journal of P2P Network Trends and Technology- (Volume1, Issue2)- 2011, ISSN: 2249-2615 [8] M. Pavani, S. Naganjaneyulu, C. Nagaraju, “ A Survey on LSB Based Steganography Methods”, International Journal Of Engineering And Computer Science ISSN: 2319-7242 (Volume 2 Issue 8) August, 2013 Page No. 2464-2467 [9] Ismail Avcibas, Bulent Sankur, Khalid Sayood, “Statistical Evaluation of Image Quality Measure”, Journal of Electronic Imaging, 11(2), 206-223(April 2002) [10] Zhou Wang, Member,Hamid R. Sheikh, “Image Quality Assessment: From Error Visibility to Structural Similarity”, IEEE Transactions On Image Processing, (VOL. 13, NO. 4), APRIL 2004 1
  • 10. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 178 [11] Yousra A. Y. Al. Najjar, Dr. D. C. Soong, “Comparison of image quality assessment: PSNR, HVS, UIQI, SSIM”, IJSER, (Vol. 3, Issue8), August-2012. ISSN2229-5518 [12] Amhamed Saffor, Abdul Rahman Ramli, Kwan-Hoong Ng, “A Comparative Study Of Image Compression Between Jpeg And Wavelet”, Malaysian Journal of Computer Science, (Vol. 14 No. 1), June 2001, pp. 39-45.