Beruflich Dokumente
Kultur Dokumente
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
I. INTRODUCTION
Steganography is the art and science of hiding information in a
deterministic sequence to prevent any person from detecting
the hiding Information without authentication, the secret
Information is embedded in a digital file by using a suitable
algorithm, there are two types of materials existing in
steganography system which are the message and the carrier
(cover), Message is the secret Information that should be
hidden and carrier is the material that takes the message in it
according to steganography algorithm and keys. The file
produced after hiding the message in the cover is called stego
object that translated from the source of the message to its
destination. There are many applications for steganography
which are military, diplomatic, and personal applications.
There are three related principles that determining the
effectiveness of steganography algorithm which are
1- The size of the message file.
2- The difficulty of detecting the message.
3- The difficulty of altering the message by simple
changing in the cover file
Steganography can be classified into three types as illustrated
in figure (1)
Text steganography.
Image steganography.
Audio steganography.
Video steganography.
Pure steganography.
107 | P a g e
www.ijccse.com
ISSN: 2312-7694
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
Steganography
Pure
Insertion
Text
Line shift
Word shift
Substitution
Image
Feature
LSBs
Blind hide
Hide seek
Public Key
Generation
Audio
LSBs
Secret Key
Parity
Video
Phase
SS
Echo
Transformation
Filter first
Battle
steg
108 | P a g e
www.ijccse.com
ISSN: 2312-7694
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
Cover
(Image)
Divided into
non overlap
blocks with size
(33)
Case (1)
Case (2)
TLSB = 0
TLSB = 1
NBITS = 2
NBITS = 1
Case (3)
Case (4)
TLSB = 2
TLSB = 3
NBITS = 2
NBITS = 1
Stego
image
Image
Case (6)
TLSB = 4
TLSB = 5
NBITS = 2
NBITS = 1
Case (7)
Case (8)
TLSB = 6
TLSB = 7
NBITS = 2
NBITS = 1
Messag
e
figure (3)
Figure (2) block diagram of the proposed system
109 | P a g e
www.ijccse.com
ISSN: 2312-7694
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
Figure (3) the direction of hiding information and number of
bits for eight cases of variable (TLSBS)
Where
NBITS is the number of bits used in hiding information.
TLSB is the value of three least significant bits.
In addition to above operations in hiding stage, hiding
information starting by substituting message bits in cover
blocks with (TLSBS = 0) then in blocks with (TLSBS = 1) and
so on. This make hiding operation progress in random fashion.
If the message pixels are (104, 128), this mean
(01101000, 10000000, .), and the cover block is
190
200
210
185
202
207
201
180
190
200
190
182
204
186
208
200
188
202
Values
Values
Before
LSBs
LSBs
After
hiding
Before
After
hiding
200
0
0
hiding
0
1
hiding
201
190
190
180
182
207
204
185
186
210
208
200
200
190
188
(l 1)
log 1
[ g (r,c) I (r,c)]
nm
2
SNR
peak
10
10
n 1 m 1
r 0 c 0
b.
10 00 00 00 ) that mean
188
200
208
186
202
204
182
190
201
110 | P a g e
www.ijccse.com
(1)
ISSN: 2312-7694
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
a- Original image
b - Message
b- Message
a- Stego image
c- Stego image
a- Original image
a-
Original image
111 | P a g e
www.ijccse.com
ISSN: 2312-7694
Samer et al. / International Journal of Computer and Communication System Engineering (IJCCSE)
b - Message
REFERENCES
[1]- Eric Cole, and Ronald D. Krutz " Hiding in Plain
Sight: Steganography and the Art of Covert
Communication", Wiley Publishing USA, 2003.
[2]- Sabu M Thampi "Information Hiding Techniques: A
Tutorial Review" Department of Computer Science &
Engineering LBS College of Engineering, Kasaragod
Kerala, India, 2004.
b- Stego image
VI. CONCLUSIONS
112 | P a g e
www.ijccse.com