Top Banner
A A Seminar Seminar On On Stegnography (Adaptive LSB Stegnography (Adaptive LSB Substitution) Substitution) Presented By Presented By Mr. Arjun R. Nichal Mr. Arjun R. Nichal
25

Stegnography (Adaptive LSB Substitution)

Mar 28, 2015

Download

Documents

Arjun Nichal
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Stegnography (Adaptive LSB Substitution)

AASeminarSeminar

OnOnStegnography (Adaptive LSB Stegnography (Adaptive LSB

Substitution)Substitution)

Presented ByPresented By

Mr. Arjun R. NichalMr. Arjun R. Nichal

Page 2: Stegnography (Adaptive LSB Substitution)

Introduction of Steganography Different types Image stegnography Stegnography system Data hiding properties Previous methods & its drawbacks Adaptive LSB substitution method Experimental results Applications Conclusion

Page 3: Stegnography (Adaptive LSB Substitution)

Stega – covered, from the Greek “stegos” Nography - writing, from the Greek “graphia” Art and Science of hiding information such that its presence

cannot be detected and a communication is happening .

Hiding one information in other information.

Page 4: Stegnography (Adaptive LSB Substitution)

Stegnography

Text ProtocolImage Audio/Video

PVDLSB

substitutionLSB

Matching

ImageDomain

TransformDomain

Page 5: Stegnography (Adaptive LSB Substitution)

It is the most widely used medium.

This field is expected to continually grow as computer graphics power also grows.

Many programs are available to apply Steganography.

Page 6: Stegnography (Adaptive LSB Substitution)
Page 7: Stegnography (Adaptive LSB Substitution)

Data Payload (Embedding capacity)

Imperceptibility

Page 8: Stegnography (Adaptive LSB Substitution)

Simple LSB Substitution:

In this method the LSB of the cover image is directly replaced by the secret bit to get a stego image.

The LSB matching:

Modifies the LSBs of the cover image for data hiding

PVD method: It provides good imperceptibility by calculating the difference

of two consecutive pixels to determine the depth of the embedded bits .

Previous methodsPrevious methods

Page 9: Stegnography (Adaptive LSB Substitution)

Some simple LSB approaches equally change the LSBs of all the pixels & have poor visible quality of the stego image.

Cannot obtain good imperceptibility.

Some data hiding methods follow the principle that the edge area can tolerate more changes than smooth areas. This does not differentiate the texture features from edge ones.

Having the low data hiding capacity.

Page 10: Stegnography (Adaptive LSB Substitution)

The stego image has low quality when equally changing LSBs of all pixels, to overcome this the HVS masking characteristics & OPAP techniques are used.

This method avoid abrupt changes in the image edge areas during data embedding procedure.

It can embed a large number of secrete data while achieving high quality of stego image.

Page 11: Stegnography (Adaptive LSB Substitution)

Let I be the original 256-level grayscale image of size m*n represented as

W be the t-bit secret data represented as

W= {w (i) | 0 ≤ i < t, w (i) € {0,1}}

Page 12: Stegnography (Adaptive LSB Substitution)

Step 1: Extract the highest r (say r= 3) bits of the original image I

to get the residual image Ir. where 1≤ r ≤ 6

Step 2: Calculate the adaptive number k(i, j) of LSBs of each

pixel in the original cover-image based on the residual image Ir .

Page 13: Stegnography (Adaptive LSB Substitution)

The bit depth k’ (i, j) can be obtained by formula:

Where 1≤ r ≤ 6, r represent the highest bits number of each

pixel used to calculate the hiding capacity in each pixel. & 1 ≤ k’ (i, j) ≤ 7- r

Page 14: Stegnography (Adaptive LSB Substitution)

k(i, j) obtained by applying histogram equalization to the bit depth k’(i, j).

Page 15: Stegnography (Adaptive LSB Substitution)

Step 3: Generate a pseudo random sequence P with number 0

and 1 by a secret key defined as P ={ p(i) |0 ≤ i < t, p(i) € {0,1}} Applying the element-wise XOR operation of the original

secret messages W and the pseudo random sequence P represented as

W˜= {w˜ (i) |w˜ (i) = w (i) p (i), 0 ≤ i < t}

Data Hiding algorithmData Hiding algorithm

Page 16: Stegnography (Adaptive LSB Substitution)

Step 4:For the (i, j) th pixel of original image I, k (i, j) bits binary secret data are read from the ultimate secret data w˜ one by one denoted as b (i, j), and then transform the binary number b into Its decimal value d (i, j).

For example, assume b (i, j) = 1001(2), then d (i, j) =9.

Step 5: Hide k(i, j) bits binary secret data b (i, j) into the

cover-image I by replacing the k(i, j) LSBs of the pixel value x (i, j) with the integer d (i, j).

Page 17: Stegnography (Adaptive LSB Substitution)

Step 6: OPAP used for reduce the hiding error.

δ(i, j) = x’ (i, j) – x (i, j)Let δ (i, j) be the hiding error between x (i,j) and x’ (i, j)

Page 18: Stegnography (Adaptive LSB Substitution)

Step 1:

Extract the highest r (say r= 3) bits of the final stego-image S to get the residual image Sr, note that Sr is the same as Ir since data hiding is not applied to the highest r bits of each pixel.

Step 2: Calculate the adaptive number k(i, j) of LSBs of each

pixel in the stego -image based on the residual image Sr .

Data extraction algorithmData extraction algorithm

Page 19: Stegnography (Adaptive LSB Substitution)

Step 3: Extract k(i, j) LSBs of the (i, j) th pixel value x” (i, j)

of stego-image S directly. Let d’ (i, j) denote the extracted secret data.

Step 4:Repeat Step 1-3 until all secret data W’ is obtained.

Finally, the final secret messages W” can be obtained W” = {w”(i) |w”(i) = w’(i) p(i) ,0 ≤ i ˂ t}

Page 20: Stegnography (Adaptive LSB Substitution)

Cover imageCover image Stego imageStego imageEmbedded data are 757332 bits.Embedded data are 757332 bits. (r=4)(r=4)

Difference between cover & stego imageDifference between cover & stego image

Page 21: Stegnography (Adaptive LSB Substitution)

Table: The average hiding capacity and PSNR values of the proposed method with r=1-6, for image size 512 * 512

rBit rate(bpp)

Capacity(bits)

PSNR(dB)

1. 5.2634 1379767 22.69

2. 4.4940 1178068 28.45

3. 3.7809 991137 33.65

4. 2.9425 771354 39.23

5. 1.9561 512787 45.27

6. 1.0000 262144 51.14

Page 22: Stegnography (Adaptive LSB Substitution)

Smart IDs.

Companies’ secret data safe circulation.

Banking application.

Military Application.

Page 23: Stegnography (Adaptive LSB Substitution)

We have proposed a novel Steganographic method by using human visual system (HVS) and LSB substitution, This method avoid abrupt changes in the image edge areas during data embedding procedure.

This method improves the quality of the stego image

The proposed method achieves higher embedding capacity and imperceptibility.

Page 24: Stegnography (Adaptive LSB Substitution)

CHIN-CHEN CHANG, MIN-HUI LIN, YU-CHEN HU “A fast and secure image hiding scheme based on LSB substitution”. International Journal of Pattern Recognition and Artificial Intelligence, 2002, vol. 16, no. 4, p. 399-416.

JEN-CHANG LIU, MING-HONG SHIH “Generalizations of pixel value differencing steganography for data hiding in images.” Fundamenta Informaticae, 2008, vol. 83, no. 3, p. 319-335.

CHENG-HSING YANG, CHI-YAO WENG, SHIUH-JENG WANG, HUNG-MIN SUN “Adaptive data hiding in edge areas of images with spatial LSB domain systems”. IEEE Transactions on Information Forensics and Security, 2008, 2008, vol. 3, no. 3, p. 488-497.

Page 25: Stegnography (Adaptive LSB Substitution)

THANK YOU !