d profiles rpc346 local settings application data mozilla firefox profiles phars9r7

Upload: satyamuraliutl

Post on 09-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    1/60

    A HIGH CAPACITY DATA-HIDING SCHEME IN LSB-BASED IMAGE

    STEGANOGRAPHY

    A Thesis

    Presented to

    The Graduate Faculty of The University of Akron

    In Partial Fulfillment

    of the Requirements for the Degree

    Master of Science

    Rajanikanth Reddy Koppola

    May, 2009

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    2/60

    ii

    A HIGH CAPACITY DATA-HIDING SCHEME IN LSB-BASED IMAGE

    STEGANOGRAPHY

    Rajanikanth Reddy Koppola

    Thesis

    Approved: Accepted:

    _______________________________ ___________________________

    Advisor Dean of the CollegeDr. Xuan-Hien Dang Dr. Chand Midha

    _______________________________ ___________________________Co-Advisor Dean of the Graduate School

    Dr. Yingcai Xiao Dr. George R. Newkome

    _______________________________ ___________________________

    Committee Member DateDr. Zhong-Hui Duan

    _______________________________

    Department ChairDr. Wolfgang Pelz

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    3/60

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    4/60

    iv

    ACKNOWLEDGEMENTS

    I would like thank my advisor, Dr.Xuan-Hien Dang for her constant

    support and invaluable guidance during this work. I am grateful to her for offering me an

    opportunity to work under her. This thesis work would not have been possible without

    her constant help and support

    I would like to thank Dr Xiao, my Co-Advisor, and Dr Duan, my Committee

    member, for their time and constant support throughout my course work.

    I would also like to thank Dr.Wolfgang Pelz for his advising throughout my

    course of study.

    I would like to dedicate this thesis to my parents who are the first teachers of my

    life. Without their encouragement, love and support, I would not have been able to reach

    this stage of my life. I am forever indebted to them for the sacrifices they made to help to

    achieve this success.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    5/60

    v

    TABLE OF CONTENTS

    Page

    LIST OF TABLES............................................................................................................ vii

    LIST OF FIGURES .......................................................................................................... viii

    CHAPTER

    I INTRODUCTION............................................................................................................1

    II. BACKGROUND AND RELATED WORK...................................................................7

    2.1 Definitions and Terminologies .........................................................................7

    2.2 Data Hiding Techniques ...................................................................................7

    2.2.1 Injection ....................................................................................................8

    2.2.2 Substitution ...............................................................................................8

    2.2.3 Generation.................................................................................................9

    2.3 Substitution Algorithms.....................................................................................9

    2.3.1 Spatial Domain Algorithm......................................................................10

    2.3.2 Tranform Domain Algorithm..................................................................11

    2.4 YIQ Color Model.............................................................................................12

    2.5 BMP File Format .............................................................................................13

    2.5.1 Header.....................................................................................................14

    2.5.2 Information Header.................................................................................15

    2.5.3 Optional Palette.......................................................................................16

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    6/60

    vi

    2.5.4 Image Data..............................................................................................17

    2.6 Alpha Channel ................................................................................................17

    2.6.1 RGBA Color Space.................................................................................18

    2.7 Existing Techniques on Hiding Large Amount of Data ..................................20

    III. DESIGN AND IMPLEMENTATION ........................................................................22

    3.1 Design ..............................................................................................................22

    3.2 Algorithm and Implementation........................................................................25

    3.2.1 Data Hiding Algorithm ........................................................................25

    3.2.2 Extraction Algorithm ...........................................................................28

    IV. METRICS, RESULTS AND DISCUSSIONS ...........................................................31

    4.1 Performance Metrics........................................................................................31

    4.2 Experimental Setup..........................................................................................33

    4.3 Amount of Secret Data Hidden in Cover Images ............................................37

    4.4 Euclidean Distance of Cover and Stego Images..............................................39

    4.5 Brightness Information of Cover and Stego images........................................40

    4.6 PSNR of Cover and Stego Images ...................................................................42

    4.7 Disadvantage of the Proposed Technique........................................................43

    V. CONLUSION................................................................................................................48

    5.1 Conclusion .......................................................................................................48

    5.2 Future Work.....................................................................................................49

    REFERENCES ..................................................................................................................50

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    7/60

    vii

    LIST OF TABLES

    Table Page

    2.1Header..........................................................................................................................152.2Information Header......................................................................................................162.3Compression Information ............................................................................................164.1Dataset of Images Used in Experiments ......................................................................334.2Amount of Data Hidden in Stego Images....................................................................384.3PSNR Table of the Cover and Stego Images...............................................................47

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    8/60

    viii

    LIST OF FIGURES

    Figure Page

    2.1 Image Steganography System........................................................................................9

    2.2 Image Header ...............................................................................................................14

    2.3 Desktop Transparent Image .........................................................................................19

    2.4 Composite Transparent Image .....................................................................................20

    3.1Proposed Hiding Procedure .........................................................................................253.2Pseudo Code for the Proposed Embedding Algorithm................................................283.3Image Extraction System.............................................................................................294.1Blue Hills .....................................................................................................................344.2Sunset...........................................................................................................................344.3 Flower ..........................................................................................................................35

    4.4 Lena .....................................................................................................................................................36

    4.5 Map ..............................................................................................................................37

    4.6 Amount of Data Hidden in Cover Images ...................................................................38

    4.7 Euclidean Distance of Cover Image and Secret Images ..............................................40

    4.8 Brightness Information of Cover and Stego Images....................................................41

    4.9 Cover Image.................................................................................................................41

    4.10 Stego Image ...............................................................................................................42

    4.11 Secret Image...............................................................................................................44

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    9/60

    ix

    4.12 Retrieved Secret Image..............................................................................................45

    4.13 Euclidean Distance of Original Secret Image and Retrieved Secret Image...............46

    4.14 Brightness Information of Original Secret Image and Retrieved Secret Image ........46

    4.15 PSNR of the Cover and Stego Image.........................................................................47

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    10/60

    1

    CHAPTER I

    INTRODUCTION

    Constantly communicated through the Internet are flows of information generated

    from many diverse applications such as e-commerce transactions, audio and video

    streaming or online chatting. The security of such data communication, which is required

    and vital for many applications nowadays, has been a major concern and ongoing topic of

    study given that the Internet is by design open and public in nature. Many techniques

    have been proposed for providing a secure transmission of data. Data encryption and

    information hiding techniques have become popular and generally complement each

    other. Whereas encryption transforms data into seemingly meaningless bits, called

    ciphertext, through the use of sophisticated and robust algorithm, information hiding [1]

    is the process of concealing messages in such a way that no one apart from the sender and

    the intended receiver even knows that there is a hidden message. The word

    steganography is of Greek origin which means covered or hidden writing [2]. The

    technique has been used in ancient times where secret messages were tattooed on the

    shaven heads of the messengers. These messengers were sent away after their hair grew

    up and were later shaved again to recover the messages.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    11/60

    2

    The general idea of hiding secret information in media has a wider range of

    applications that go beyond steganography. For example, an image printed on a document

    could be annotated by metadata that could lead a user to its higher resolution. Due to the

    high proliferation of digital images and the high degree of redundancy present in digital

    images, there is an increased interest in the usage of images as the cover object in

    steganography. The Least-Significant-Bit (LSB) technique is one of the most widely used

    scheme for image steganography. This technique involves the modification of the LSB

    planes of the images. In this technique, the message is stored in the LSB of the pixels

    which could be considered as random noise. Therefore altering them does not

    significantly affect the quality of the cover image. Variations of the LSB algorithms

    include one or more LSB bits. The motivation for this study is to provide security to

    confidential RGB images such as maps or sensitive signed documents. The basic

    principle of steganography is to hide the secret information in the cover object, which can

    be a digital medium such as image, audio or video file, to obtain a stego file that has

    secret information hidden in it.

    The different types of steganography techniques are substitution, transform

    domain, spread spectrum, statistical and distortion techniques and cover generation

    techniques. Substitution techniques replace the least significant bits of each pixel in the

    cover file with bits from the secret document. The transform domain technique hides

    secret information in the transform space (like frequency domain) by modifying the least

    significant coefficients of the cover file. Most research in the category of transform

    domain embedding is focused on taking advantage of redundancies in Discrete Cosine

    Transform (DCT). This technique is mostly used for JPEG images in order to compress

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    12/60

    3

    images. Changing a large number of coefficients does not produce any visible alterations

    but incurs a large amount of changes in compression rates. Therefore the embedding

    capacity of the DCT technique is less compared to LSB technique. Spread spectrum

    techniques spread hidden information over different bandwidths. Even if parts of the

    message are removed from several bands, there would still be enough information present

    in other bands to recover the message. Statistical techniques change several statistics of

    the cover file and then split it into blocks where each block is used to hide one message

    bit. The cover block is modified when message bit is 1. Distortion techniques exploit

    signal distortion to hide information. For example the sender applies a sequence of

    modifications to the cover file which corresponds to the secret information. Then the

    receiver measures the differences between the original cover and the distorted cover

    images to detect the sequence of modifications and consequently recover the secret

    message. Cover generated techniques different from the other steganography techniques.

    Typically a cover object is chosen to hide the secret message but this technique creates a

    cover object for the purpose of hiding the information, such as transforming secret

    message bits into sentences by selecting words out of the dictionary for example.

    Two important properties of steganographic technique are perception and payload

    [3]. Steganography generally exploit human perception because human senses are not

    trained to look for file that has hidden information inside of them. Therefore

    steganography disguises information from people who try to hack them. Payload is the

    amount of information that can be hidden in the cover object.

    Many steganographic techniques have been introduced to increase the payload. S-

    Tools is one of the popular online steganographic tool based on the LSB technique. It

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    13/60

    4

    hides data in the least significant bit of each color pixel in the image. The main

    disadvantage of this technique is that it can hide secret message of only 12% of the cover

    image data but maintains a very good perceptual image quality. In 2003, a new spatial

    domain technique called Bit Plane Complexity Segmentation (BPCS)[4] was proposed

    based on Most Significant Bit technique. It hides data in higher bit planes of the cover

    image. This technique could not hide large amount of data because changing most

    significant bits can cause significant changes in perception. In 2005, Yeuan-Kuen Lee

    and Ling-Hwei Chen [5] proposed a technique based on LSB algorithm. They used the

    properties of image contrast and luminance to hide the data in the 4 lower bits of the

    cover image pixels, which showed good results in terms of perception. In 2005, Seppanen

    Makela and Keskinarkaus [6] proposed a new algorithm to hide large amount of data,

    which has the advantage of hiding data in the 6 LSB bits of the cover image with lower

    level of noise. They could achieve hiding capacity of up to 60% of the cover image data.

    In 2007, Nameer [7] proposed an algorithm to improve the efficiency of the payload. The

    advantage of the technique is that it has high level of security implemented in it while

    hiding the factors of data value in 4 LSB bits of the cover image. All these algorithms

    show how steganography techniques have improved to extend hiding capacity to a very

    high payload.The most obvious limitation to these techniques is that the cover image

    must be very large compared to the secret information. We can hide large amount of

    information in multiple files but it could lead to suspicion. Therefore it is very important

    to use only one image file to hide the entire secret information.

    In this work, we present a new steganographic technique to embed large amount

    of data in RGBA images while keeping the perceptual degradation to a minimum level

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    14/60

    5

    This technique allows hiding an uncompressed color image in an uncompressed color

    image. Our motivation to hide images in images is to provide security to images that

    contain confidential information. For example sensitive documents can be scanned and

    embedded into an image which can be then sent confidentially using this technique. We

    also note that NTSC (National Television System Committee) broadcasts TV signals

    using the YIQ color system. They broadcast the YIQ components as the signal to the

    televisions which then reconverts them to RGB color system. The black and white TVs

    use the Y component to project the picture onto the screen while the color television use

    all the three YIQ components. The proposed technique is similar to the transmission done

    by the NTSC system. The major challenge here is to increase the hiding capacity to

    almost the same size as the cover image. We propose to utilize the YIQ color model

    where Y is the grayscale value of the image while I and Q are the color components. We

    transform the RGB pixel value of the secret image into YIQ color space and then use the

    LSB technique to hide the data in the LSB bits of the cover image. In this technique we

    use YIQ color model to hide the data in the regions where human eyes cannot perceive

    the change in perceptions (color blindness). We use about 13 LSB bits of the cover image

    to hide the transformed grayscale value of the secret image in the cover image. This

    causes change in the quality of the cover image but results show good perception is

    maintained due to the hiding of data in the regions where human eye cannot spot the

    changes in the image quality like the blue color. We also propose to utilize the alpha

    value of the cover image to hide the data. In almost all of the previous techniques, the

    alpha value has been ignored or not used to hide data because most of the images in the

    past do not have alpha value. Only PNG images have alpha component that describes the

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    15/60

    6

    transparency of the image. But these days, a significant amount of transparent or

    layered images can be found posted online therefore in this work we also utilize the least

    significant bits of the alpha value to embed data. Our experimental results showed

    changing the 3 LSB bits of the alpha value does not cause significant changes in the

    perception of the image. We demonstrated that it is possible to attain the practical hiding

    capacity of up to 100% of the cover image size. This technique holds good against visual

    attacks but the disadvantage is that it is detectable against statistical attacks because we

    are using 13 LSB bits of the cover image. However this can be easily overcome by

    applying transform domain and compression technique to increase the security of the

    cover image [8].

    This thesis is organized as follows. In Chapter 2, we present a brief background to

    the steganography technique. The proposed scheme has been detailed in chapter 3 and

    analysis of results is presented in chapter 4. Finally, chapter 5 provides conclusion and

    future work to improve the proposed technique

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    16/60

    7

    CHAPTER II

    BACKGROUND AND RELATED WORK

    2.1 Definitions and Terminologies

    Steganography techniques aimed at secretly hiding data in a multimedia carrier

    such as text, audio, image or video, without raising any suspiscion of alteration to its

    contents. The original carrier is referred to as the cover object. In this work, we will

    mainly focus on image steganography. Therefore, the term cover object now becomes

    cover image. Figure 2.1 illustrates a basic information hiding system in which the

    embedding technique takes a cover image and a secret image as inputs and produces as

    output a stego image, which is the seemingly unchanged cover image with the embedded

    data. The stego image may be sent over the communication links to the receiver who can

    then carry out the extraction procedure to retrieve the secret message from the stego

    image.

    2.2 Data Hiding Techniques

    There are three different approaches that can be used to hide information in a

    cover object: injection, substitution and generation.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    17/60

    8

    2.2.1 Injection

    The data can be hidden in sections of a file that are ignored by the processing

    application using injection technique[14]. Therefore file bits that are relevant to an

    end-user are not modifiedleaving the cover file perfectly usable. For example, we can

    add additional harmless bytes in an executable or binary file. Because those bytes don't

    affect the process, the end-user may not even realize that the file contains additional

    hidden information. However, using an insertion technique changes file size according to

    the amount of data hidden and therefore, if the file looks unusually large, it may arouse

    suspicion.

    2.2.2 Substitution

    Substitution technique is used to replace the least significant bits of information

    that determine the meaningful content of the original file with new data in a way that

    causes the least amount of distortion. The main advantage of this technique is that the

    cover file size does not change after the execution of the algorithm. On the other hand,

    this approach has at least two drawbacks. First, the resulting stego object may be

    adversely affected by quality degradationand that may arouse suspicion. Second,

    substitution limits the amount of data that you can hide to the number of insignificant bits

    in the file.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    18/60

    2.2.3 Generation

    Unlike injection and substitution, generation techniques [15] do not require an

    existing cover file. This technique generates a cover file for the sole purpose of hiding the

    message. The main flaw of the insertion and substitution techniques is that people can

    compare the stego object with any pre-existing copy of the cover object (which is

    supposed to be the same object) and discover differences between the two. We will not

    have that problem when using a generation approach, because the result is an original

    file, and is therefore immune to comparison tests.

    Secret image

    Extraction algorithm

    Secret image

    Cover imageNoise/DistortionCover image

    Data-hiding algorithm

    Figure 2.1 Image Steganography System

    2.3 Substitution Algorithms

    There is an increased interest in using digital images as cover objects for the

    purpose of steganography because of the proliferation of digital images over the Internet

    9

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    19/60

    10

    and given the high degree of redundancy present in a digital representation of an image

    (despite compression). There has been a number of image steganography technique

    algorithms based on the substitution approach. They can be categorized into two types:

    spatial domain techniques and transform domain techniques. In the spatial domain

    approach, the cover image pixels are directly used to inscribe bits of the secret data

    whereas in the frequency domain, the cover image first undergoes a transformation into

    its frequency domain and then its transformed coefficients are altered to embed the secret

    information.

    2.3.1 Spatial Domain Algorithm

    Spatial domain algorithms embed data by substituting carefully chosen bits from

    the cover image pixels with secret message bits. LSB-based techniques are the most

    widely known steganography algorithms, which work by replacing the least significant

    bits of an image pixel. These modifications could be interpreted as random noise, which

    should not have any perceptible effect on the image. That is usually an effective

    technique in cases where the LSB substitution does not cause significant quality

    degradation, such as in 24-bit bitmaps. Some algorithms change LSB of pixels visited in

    a random walk, others modify pixels in certain areas of images, or simply increment or

    decrement of the pixel value [12]. Our proposed technique is based on LSB technique.

    For example, to hide the letter "a" (ASCII code 97 that is 01100001) inside eight

    bytes of a cover, we set the LSB of each byte like this:

    10010010 01010011 10011011 11010010

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    20/60

    11

    10001010 00000010 01110010 00101011

    The application decoding the cover reads the eight Least Significant Bits of those

    bytes to re-create the hidden bytethat is 0110001the letter "a."

    2.3.2 Transform Domain Algorithm

    Transform domain techniques[13] hide data in mathematical functions that are in

    compression algorithms. Discrete Cosine Transform (DCT ) technique is one of the

    commonly used transform domain algorithm for expressing a waveform as a weighted

    sum of cosines. The data is hidden in the image files by altering the DCT coefficient of

    the image. Specifically, DCT coefficients which fall below a specific threshold are

    replaced with the secret bits. Taking the inverse transform will provide the stego image.

    The extraction process consists in retrieving those specific DCT coefficients.

    Our proposed technique is based on LSB technique which will replace more than

    one bit from each pixel to hide secret data. But the security of the secret message can be

    enhanced by combining the Least Significant Bit Technique (LSB), Discrete Cosine

    Transform (DCT) and compression technique [8]. The LSB technique is used hide the

    secret image bits in the cover image to obtain the stego image. The stego image is

    transformed from spatial domain to the frequency domain using DCT. And finally

    quantization and runlength coding algorithms[8] can be used for compressing the stego

    image to enhance the security.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    21/60

    2.4YIQ Color Model

    YIQ color model was introduced in 1940s [14] and is used by the U.S.

    Commercial Color Television Broadcasting. It is a recoding of RGB for transmission

    efficiency and for download compatibility for black and white television. It is transmitted

    using the NTSC (National Television System Committee) system [14]. They transmitted

    only one monochrome video signal to both the black and white as well as color

    televisions. Therefore it is required for them to add color to the monochrome video

    signal. The first step for them was to analyze and quantify the properties of the human

    perception. The committee International Eclarge (CIE) was established to define an

    average human observer. The human eye is most sensitive to green or yellow light and

    least sensitive to red or blue lights. It was found that the monochrome resolution of the

    eye is much greater than the color resolution. As details become very small, all the eye

    can discern is the changes in the brightness of the color. Beyond a certain level of detail,

    color cannot be distinguished and therefore the human eye becomes color blind.

    Colors in an image can be converted to a shade of gray by calculating the effective

    brightness or luminance of the color and using this value to create a shade of gray that

    matches the desired brightness. The effective luminance of the pixel is calculated with the

    following formula

    12

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    22/60

    13

    The Y component of YIQ is luminance component of the color TV signal that is

    shown on black and white televisions. The chromaticity is encoded in I and Q

    components. The colors specified by YIQ model solve the major problem with the signal

    being prepared for broadcast television. Two different colors of the two adjacent pixels

    appear to be different but when converted to YIQ and viewed on the monochrome

    monitor appears to be same. This can be solved by specifying the two colors with

    different Y values. This model exploits two useful properties of the human visual system.

    First, the system is more sensitive to changes in luminance than to changes in hue and

    saturation; that is our ability to discriminate spatially monochrome information. This

    suggests that more bits of bandwidth should be used to represent Y than are used to

    represent I and Q, so as to provide higher resolution in Y. Secondly, objects that cover a

    very small part of our field of view produce a limited color sensation, which can be

    specified adequately with one rather than two color dimensions. This suggests that either

    I or Q can have lower bandwidth. The NTSC encoding of YIQ into a broadcast signal

    uses these properties to maximize the amount of information transmitted in a fixed

    bandwidth.

    2.5BMP File Format

    The BMP file format is an image file format used to store bitmap digital images

    [16]. In uncompressed bmp files and many other bitmap file formats, image pixels are

    stored with a color depth of 1,4,8,16,24 or 32 bits per pixel. An alpha channel for

    transparency may be stored in a separate file or in fourth channel that converts 24 bit

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    23/60

    14

    images to 32 bits per pixel. Uncompressed bitmap files such as BMP files are typically

    much larger than compressed image file formats for the same image. For example an

    image of 1058 * 1058 pixels in png format occupies about 287.65 KB while in 24 bit

    BMP file it occupies about 3358KB. Uncompressed formats are generally unsuitable for

    transferring images on the internet or other slow capacity media.

    A BMP image file structure consists of either three or four parts as shown in

    figure 2.2 [18]. The first part is header, the second is the information header, the third is

    optional palette and the fourth one is all the pixel data. The position of the image data

    with respect to the sart of the file is contained in the header. The information about the

    image such as image width or height, the type of compression, the number of the colors is

    contained in the information header.

    HEADER

    14 bytes

    INFORMATION HEADER

    40 bytes

    OPTIONAL PALETTE IMAGE DATA

    Figure 2.2 Image Header

    2.5.1 Header

    The header consists of two fields i.e. type and offset. Type field is used to do a

    simple check whether the file is a bmp file or not. The offset field gives the number of

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    24/60

    15

    bytes before the actual pixel data. This Block of bytes is at the beginning of the file and is

    used to identify the file. An application reads this block in the file to ensure that the file is

    actually a BMP file and is not damaged. The figure 2.1 [16] shows the header

    information of the image.

    Table 2.1 Header

    Offset# Size Purpose

    0 2 The number used to identify the BMP file

    2 4 The size of the BMP file in bytes.

    6 2 Reserved; actual value depends on the application that creates the image

    8 2 Reserved; actual value depends on the application that creates the image10 4 The offset, i.e. starting address of the byte where the bitmap data can be

    found.

    2.5.2 Information Header

    Table 2.2 shows the header information which consists of four fields. They are

    image width and height, the number of bits per pixel, the number of planes and the

    compression type. This block of bytes gives the detailed information about the image to

    the application, which is used to display the image on the screen. It also matches the

    header used internally by windows and has several different variants and all of them

    contain a word field which specifies the size. Therefore any application can easily know

    that which header is used in the image. Table 2.3 [16] shows the different possible

    compression rates.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    25/60

    16

    Table 2.2 Information Header

    Offset # Size Purpose

    14 4 The size of the header(40 bytes)

    18 4 The bitmap width in pixels(signed integer)

    22 4 The bitmap height in pixels(signed integer)26 2 The number of color planes used

    28 2 The number of bits per pixel used( 1, 4, 8, 16, 24, 32 )

    30 4 The compression method being used.

    34 4 The size of the image

    38 4 The horizontal resolution of the image

    42 4 The vertical resolution of the image

    46 4 the number of colors in the color palette (0 or default 2n)

    50 4 The number of colors used or 0, when every color used.

    Table 2.3 Compression Information

    Value Identified Compression Comments

    0 BI_RGB None Most common

    1 BI_RLE8 RLE 8 bit/pixel Can be used only with 8 bit/pixel

    2 BI_RLE4 RLE 4 bit/pixel Can be used only with 4 bit/pixel

    3 BI_BITFIELDS Bit field Can be used only with 16 or 32 bit/

    4 BI_JPEG JPEG The bitmap contains a jpeg image

    5 BI_PNG PNG The bitmap contains a PNG image

    2.5.3 Optional Palette

    Optional palette occurs in the BMP file directly after the BMP header. It is a

    block of bytes listing the colors available for use in a particular indexed-color image.

    Each pixel in the image is described by the number of bits 1, 4 or 8 which index a single

    color in this table. The purpose of the color palette in indexed-color bitmaps is to tell the

    application the actual color that each of these index values corresponds to. A color is

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    26/60

    17

    defined using the 3 values for R, G and B. This color palette is not used if the bitmap is

    16 bit or higher otherwise there are no palette bytes in those BMP files.

    2.5.4 Image Data

    Image data block of bytes describes the image, pixel by pixel. Pixels data are

    stored upside down with respect to normal raster scan order starting in the lower left

    corner, going from left to right, and then row by row from the bottom to the top of the

    image.

    2.6Alpha Channel

    In computer graphics, alpha compositing is the technique of mixing an image with

    a background to create the appearance of the partial transparency. This process is useful

    to render images in separate passes and then combine them into a final image. To

    combine these elements correctly, it is important to keep matte (contains the coverage

    information like the shape of the geometry). To store this information, the alpha channel

    was introduced by A R.Smith in 1970, s [17]. In 2D images, pixel stores the color value.

    For transparent images, it stores an extra value called the alpha value. A value of 0 means

    that the pixel has no coverage information and is fully transparent. And a value 1 or 255

    means the image is opaque.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    27/60

    18

    2.6.1 RGBA Color Space

    RGBA stands for Red Green Blue Alpha. It extends the RGB color model with

    the alpha value. Alpha channel was invented in 1971 by Catmull and Smith [18] after the

    Greek letter in the classic linear interpolation A + (1-) B. This channel is used as an

    opacity channel. The A value varies from 0 to 255, in which 0 means completely

    transparent while 255 means opaque. PNG images follow the RGBA color model.

    In our proposed technique, RGB images serve as cover images. However, not all RGB

    images contain an alpha value. If RGB images are used to hide the information, it can

    lead to suspicion because the default value of the alpha in the RGB images is 255. In

    RGBA images alpha value is not same in all the pixels of the image. Therefore the

    proposed technique gives much better results if RGBA images are used. The figures 2.3

    [25] and 2.4 [26] are the example transparent images.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    28/60

    Figure 2.3 Desktop Transparent Image

    19

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    29/60

    Figure 2.4 Composite Transparent Image

    2.7 Existing Techniques on Hiding Large Amount of Data

    S-tools is a steganography tool available online used to hide data in pictures,

    sound, etc... It is based on the LSB technique. This tool can hide only 12% of the cover

    image data. It uses only three bits of each pixel to hide the data but this has very good

    perception on the cover image.

    In 2003, Yeshwanth Srinivasan [4] proposed a spatial domain technique called bit

    plane complexity segmentation (BPCS) steganography which hides large amount of data.

    This technique is based on the simple idea that the higher bit planes could be used for

    hiding information provided they are hidden in seemingly complex regions.

    20

    In 2005, Yeuan-Kuen Lee and Ling-Hwei Chen [5] proposed a steganographic technique

    based on LSB technique to hide large amount of data. In this technique they have used 4

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    30/60

    21

    LSB bits of the pixel to hide the secret data. Therefore they could hide about 50% of the

    cover image data. The hiding algorithm of this technique is based on the contrast and

    luminance property. They used three components to maximize the hiding capacity,

    minimizing the embedding error and eliminate the false contours. This advantage of this

    technique is that it maintains good perception in the cover image.

    In 2005, Seppanen Makela and Keskinarkaus [6] have proposed a high capacity

    steganography technique to hide information in the color image. The hiding algorithm

    based on this technique could hide large amount of data and lower the level of noise.

    They used about 6 bits per pixel to hide the data; therefore they could hide more data

    compared to previous techniques.

    In 2007, Nameer [7] proposed a technique of hiding a large amount of data with

    high security using steganographic algorithm. In this technique, they tried to improve the

    efficiency of the payload. They have used adaptive image filtering and adaptive image

    segmentation with bits replacement on the appropriate pixels. Those pixels are selected

    randomly by using a new concept, defined by main cases with their sub cases for each

    byte in one pixel which is based on visual and statistical. High security is provided to the

    secret message. Using this algorithm they could hide about 75% of the cover image size

    with high quality of the output and used remaining 25% of the data for the security.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    31/60

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    32/60

    the extra 8 bits, called alpha channel, specifying transparency. The resulting image is

    referred to as an RGBA (RGB + Alpha channel) image. Applying the LSB substitution

    scheme to RGBA images will increase the embedding capacity since the 8-bit alpha

    channel can be utilized as well.

    Another way to provide high hiding capacity is to reduce the size of the secret

    color image before embedding, which can be achieved by compression, quantization or

    other transformation functions. Our proposed technique relies on a transformation

    function based on the YIQ color model, which is the US standard where Y provides the

    intensity which is the signal used for black and white TVs and I and Q encode

    chromaticity. The objectives of the YIQ system were to provide a signal that could be

    directly displayed by black and white TVs, and at the same time provide easy coding and

    decoding of RGB signals. The Y componentconveys the luminance information and is

    transmitted on a separate carrier signal from the chromaticity components. It can be

    computed as a linear function of the RGB values as follows:

    (3.1)

    where , and are the three red, green and blue pixel values, respectively.

    In the RGB color space, each color can be represented as a 3-tuple vector

    . Color quantization can be used to reduce the 224

    possible colors by

    approximating the original pixels with their nearest color representative in a 256-entry

    color palette. However, the quality of the image is greatly affected by how the

    construction of the palette can accurately represent the possible colors in an image. In our

    approach, the transformation or encoding function must efficiently reduce the size of the

    image to be stored and at the same time provide an accurate representation of the original

    )I,I,(II BGRS =

    23

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    33/60

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    34/60

    Cover Color Image

    (RGBA)

    Y(r,g,b)

    Encoding

    LSB -based

    Embedding Algorithm

    Stego-Image

    Secret Color Image

    (RGB)

    Figure 3.1 Proposed Hiding Procedure

    3.2 Algorithm and Implementation

    The embedding algorithm takes a cover image and a secret image as the inputs.

    The size of the secret image can be as large as the cover image. The new RGB values are

    then computed and hidden in the LSB bits of the cover image using LSB technique.

    3.2.1 Data Hiding Algorithm

    Step 1: First, take a cover image of size M*N and a secret image of size up to M*N as the

    inputs.

    25

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    35/60

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    36/60

    including the 8-bit alpha channel. The amount of lower bits used for hiding the 13-bit

    pixel from the secret image is distributed among the R, G, B and A components of the

    cover image as follows:

    Alpha Red Green Blue

    1 1 1 1 1 1 1 1 | 1 1 1 1 1 1 1 1 | 1 1 1 1 1 1 1 1 | 1 1 1 1 1 1 1 1

    This method uses 3 lower bits from alpha, red, green values and 4 bits for blue values.

    However, value of the secret image requires 4 bits, therefore it uses 3 LSB bits of

    the alpha value and one bit of the red value of the cover image.

    Alpha Red

    11 1 1 1 1 1 1 | 1 1 1 1 1 1 1 1

    Gnew value of the secret image requires 5 bits, therefore it uses 2 lower bits of the red

    value and 3 lower bits of the green value of the cover image.

    Red Green

    11 1 1 1 1 1 1 | 1 1 1 1 1 1 1 1

    value of the secret image requires 4 bits to represent, therefore it uses 4 lower

    bits of the blue value of the cover image.

    Blue

    1 1 1 1 1 1 1 1

    The pseudocode for the entire embedding procedure is shown in figure 3.2.

    27

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    37/60

    //read pixel data from the image

    for each(i=0;i

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    38/60

    Stego Image Extract LSB bits from the

    stego image

    Apply inverse function to

    the extract (r,g,b) valuesSecret Image

    Figure 3.3 Image Extraction System

    Step1: Take the stego image and extract the corresponding number of lower bits in the

    alpha, red, green and blue values.

    Step2: To extract the red value of the secret image, concatenate the 3 lower bits of the

    alpha value with one upper bit of the red value.

    Alpha Red

    1 1 1 1 1 1 1 1 | 1 1 1 1 1 1 1 1

    29

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    39/60

    After obtaining the 4 bits, convert them to an integer value Rcs. Multiply Rcs by the

    factor f1, i.e. 5, then divide the resultant value by 0.299 to obtain the red value of the

    secret image.

    Red value of the secret image=

    Similarly, to retrieve the green value of the secret image, first concatenate 2 lower bits of

    the red value with the 3 lower bits of the green value.

    Red Green

    1 1 1 1 1 1 1 1 | 1 1 1 1 1 1 1 1

    After obtaining the 5 bits, convert them to an integer value Gcs, which is then multiplied

    by factor f2 , then divide the resultant value by 0.587.

    Green value of the image =

    The blue value of the secret of the image can be obtained by extracting the 4 lower bits of

    the blue pixel.

    Blue

    1 1 1 1 1 1 1 1

    After obtaining those 4 bits, convert them into an integer value Bcs, which is multiplied

    by factor f3, then divide the resultant value by 0.299.

    Blue value of the image =

    Finally set these red, green and blue values for each pixel to obtain the secret image.

    30

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    40/60

    31

    CHAPTER IV

    METRICS, RESULTS AND DISCUSSIONS

    4.1 Performance Metrics

    A series of experiments was conducted to show the effectiveness of the proposed

    technique. The efficiency of the proposed technique is measured by four metrics which

    are

    1. Amount of secret data hidden in the cover image.2. Euclidean distance of the cover and stego images.3. Brightness information of the cover and stego images.4. PSNR (Peak Signal-to-Noise Ratio) of cover and stego images.The objective of measuring the amount of data hidden in the cover image is to show

    that the proposed technique can hide a large amount of data, which will be compared to

    results obtained using S-Tools[19] technique..

    The Euclidean distance of the cover and stego images is used to show that there is not

    much change in the color perception of the two images. Euclidean norm is the measure

    used to find the closest palette color of the cover and stego images for palette based

    images. The objective of this measure is to see that pixel value of the cover image with a

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    41/60

    particular palette color is not changed to a completely new palette color. If the

    Euclidean distance is very high then there is a possibility that pixels have been changed

    to new palette colors. The Euclidean norm formula shown in (4.1) is derived from the

    Euclidean distance formula for palette based images and applied to the RGB images to

    quantify the degree of change in the color between the cover and stego images. It

    calculates the distance between color pixels of the cover and stego images [7].

    (4.1)

    The brightness information of the cover and stego images is used to compare the

    perception of the cover and the stego images in terms of intensity. It is computed using

    equation 4.2. This measure is used to characterize robustness against visual attack on the

    stego image [12], that is, if there is any change in the quality of the images such that it is

    difficult for the attacker to notice the presence of secret information hidden in the cover

    image.

    Brightness = (4.2)

    The PSNR (peak signal to noise ratio) is used to measure the quality of stego image

    compared to the cover image. It is calculated using equation 4.3, where MSE defined in 4.4 refers

    to mean square error.

    (4.3)

    32

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    42/60

    (4.4)The quality of the image is higher if the PSNR value of the image is high. Since PSNR is

    inversely proportional to MSE value of the image, the higher the PSNR value is, the lower the

    MSE value will be. Therefore the better the stego image quality is the lower the MSE value will

    be.

    4.2Experimental Setup

    The simulation for the experiment was set up and run on a WindowsXP

    Professional on 1.8 GHz with 1 GB of RAM. In the experiments we have used 82 images

    to test the proposed technique. Table 4.1 shows the classification of the images. Figures

    4.1 to 4.5 show five standard images used in our experiments [20-24]. Euclidean distance

    and brightness information value are expressed as average measurements of all images.

    Table 4.1 Dataset of Images Used in experiments

    Image Types of images Size(M*N) #images Characteristics

    Small size images (400*400) (12+5)

    Compressed Images,

    consists of variable

    colored paletteimages, densely

    colored palette

    Images and maps.

    Small size images (400*400) (12+5)

    UncompressedImages, consists ofvariable colored

    palette images,

    densely colored

    paletteImages and maps.

    33

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    43/60

    Figure 4.1 Blue Hills

    Figure 4.2 Sunset

    34

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    44/60

    Figure 4.3 Flower

    35

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    45/60

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    46/60

    Figure 4.5 Map

    4.3Amount of Secret Data Hidden in Cover Images

    Table 4.2 shows the amount of the data hidden in the standard images using the

    proposed technique and S-Tools algorithm. Figure 4.6 displays two bars, representing

    results obtained with S- Tools technique compared with the proposed technique. The x-

    axis in the graph represents the cover images while y-axis represents the amount of data

    37

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    47/60

    hidden in the image. The proposed technique has the capability of embedding up to the

    same amount of secret data as the cover image. In fact, experimental testing includes

    using the secret image as the cover image to show exactly 100% of data hiding. S-Tools

    technique uses only one bit per color pixel to embed data, therefore can only hold 12% of

    payload.

    Table 4.2 Amount of Data Hidden in Stego Images

    Images Size of the

    Image (Bytes)

    % of Data hidden in

    S-Tools technique

    % of Data hidden in

    the proposed technique

    Blue Hills 562554 12.4 100Sunset 230454 12.4 100

    Flower 737334 12.4 100

    Lena 786486 12.4 100

    Map 709854 10.4 100

    Figure 4.6 Amount of Data Hidden in Cover Images

    38

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    48/60

    39

    4.4Euclidean Distance of the Cover and Stego Images

    Figure 4.7 shows the Euclidean norm of the cover and stego images. The flower

    image has the highest Euclidean norm because it has large amount of uniform palette

    color, while the Lena image has lowest Euclidean norm because it has small amount of

    palette color compared to the other images. Medium size images have the highest values,

    which are given as the average of 12 medium-size images. Similarly, average of small

    images with size ranging from 20*20 to 99*99 and large images of size greater than

    400*400 are given. The large size images hiding 100% of data show low Euclidean

    values, which means that this technique is much better at hiding large amount of data.

    One reason for the high values for small- and medium-size images is that they do not

    utilize all the pixels of the cover image.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    49/60

    Figure 4.7 Euclidean Distance of Cover Image and Secret Images

    4.5Brightness Information of the Cover and Stego Images

    Figure 4.8 displays four bars, referring to the cover image shown in figure 4.9 and

    the stego-image with 100 % data, medium-size images and small-size images embedded

    shown in figure 4.10. Since all the bars are almost the same, it illustrates that there is very

    small change in the quality of the cover and stego images. Therefore there are fewer

    possibilities for visual attack on the stego image.

    40

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    50/60

    Figure 4.8 Brightness Information of Cover and Stego Images

    Figure 4.9 Cover Image

    41

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    51/60

    Figure 4.10 Stego Image

    4.6PSNR of the Cover and Stego Images

    The fig 4.11 shows the PSNR values of the cover and stego images obtained from

    the S-Tools technique and the proposed technique. The blue bar refers to the PSNR

    values of cover and stego images obtained from STools technique while the red bar refers

    to the PSNR values of cover and stego images obtained from the proposed technique and

    the green bar refers to the PSNR values of secret image and the retrieved secret image.

    This figure shows the degradation in image quality relative to results using S-Tools. This

    was expected as the proposed technique modifies more LSB bits compared S-Tools

    42

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    52/60

    43

    technique. However, the results show that the changes in the stego image cannot be

    perceptible by the human eye.

    4.7Disadvantages of the Proposed Technique

    The retrieved image secret image has incurred some negligible loss of data when

    the original secret image was transformed. This is due to the rounding off the pixel values

    i.e. like rounding off from 0.5 to 1.0 or 0.1 to 0.

    Approximate change in pixel values of the secret image before hiding and after retrieving

    is as follows:

    Red pixel value (Rs-8) < Rs < (Rs+8)

    Green pixel value (Gs-5) < Gs < (Gs+5)

    Blue pixel value (Bs-8) < Bs < (Bs+8)

    Figures 4.15 shows the Euclidean distance of the original secret image (Figure

    4.13) and retrieved secret image (Figure 4.14). This graph demonstrates that there is

    negligible amount of data loss in the image. Fig 4.16 shows the brightness information of

    the original and secret image, which demonstrates that there is not much change in the

    perception of the secret image obtained after it is retrieved from the stego image.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    53/60

    Figure 4.11 Secret Image

    44

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    54/60

    Figure 4.12 Retrieved Secret Image

    45

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    55/60

    Figure 4.13 Euclidean of Original Secret Image and Retrieved Secret Image

    Figure 4.14 Brightness Information of Original Secret Image and Retrieved Secret Image

    46

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    56/60

    Figure 4.15 PSNR of the Cover and Stego Images

    Table 4.3 PSNR Table of the Cover and Stego Images

    S-Tools ProposedTechnique

    (Cover Image )

    Proposed Technique

    (Secret Image)

    67.1 36.5 36.2

    63.2 35.8 3668.1 34.5 35.5

    68.5 36 36.1

    67 36.1 36.2

    47

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    57/60

    48

    CHAPTER V

    CONCLUSION AND FUTURE WORK

    5.1 Conclusion

    In this work, we have presented a technique that allows hiding a color image

    (secret object) in another color image (cover object), where both images might be of

    same size, therefore achieving up to 100% payload. It is based on one of the popular and

    simple Least Significant Bit substitution techniques. It was extended to take into account

    the alpha channel in RGBA images, which are used as cover images. In addition, a

    transformation function based on the conversion from RGB color space into YIQ color

    space was used to reduce the size of the secret image before embedding. Combining

    those techniques allows us to satisfy our initial objectives of providing a way to embed a

    large amount of secret data while maintaining imperceptibility.

    With continued research and improvement in algorithm design, steganography

    can be taken as a serious means to hide data and the present work appears that it was

    more efficient in hiding more data (payload) than the algorithm used in S- Tools [3]. We

    performed four types of comparison; the first one was used to compare the present

    algorithm with S-Tools algorithm through the amount of data that can be hidden. The

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    58/60

    49

    second and third comparison were made upon the statistical attack; it shows that it is

    difficult to distinguish between cover object and the stego object as found by computing

    the Euclidian distance and the brightness information. Finally, the last comparison used

    the PSNR value, which indicates that changes in the stego-image cannot be perceptible

    by the human eye.

    5.2 Future Work

    In the proposed technique, the results show that there is some loss of data in the

    retrieval of the secret image (secret object). The loss is due to the rounding off from 0.5

    to 1.0 or 0.1 to 0.5 during the embedding algorithm. However, the image can afford to

    lose some data and still retain good quality. This is the main reason that we could hide

    large amount of data and achieve up to about 100% payload.

    The future work that can be pursued on this work include the design of the

    algorithm where the there is no loss of data in the secret image and provide security to the

    secret image.

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    59/60

    50

    REFERENCES

    1. Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn,Information hiding-

    Survey, IEEE, 87(7):1062-1078, 1999.

    2. G. J. Simmons, The Prisoners problem and the subliminal channel in Advances in

    Cryptology, Proc.crypto 83:5567, 1983.

    3. Udit Budddia and Deepak Kundur, Digital video steganalysis exploiting collusion

    Sensitivity,IEEE, 1(4):502-516, 2006.

    4. Furuta, T,.Noda, H., Niimi, M., Kawaguchi E,Bit-plane decompositionsteganography using wavelet compressed video, Joint Conference of the

    Fourth International Conference, 2(5): 970 - 974, 2003.

    5. V.Karthekayani and kammalakan, Conversion grayscale image to color image with

    and without texture synthesis, International journal of computer science and network

    security, 7(4):11-16, 2007.

    6. Eiji Kawaguchi and Richard O. Eason, Principle and applications of BPCS-

    Steganography, Proc. SPIE ,3528: 464-473 , 1999.

    7. Nameer N. EL-Emam, Hiding a Large Amount of Data with High Security Using

    Steganography Algorithm Jordan Journal of Science publications, 3 (4): 223-232,2007.

    8. K B Raja, C R Chowdary K R Venugopal, A Secure Image Steganography usingLSB, DCT and Compression Techniques on Images, IEEE, 170-176, 2005.

    9. Naofumi, Technique of lossless steganography,IEICE Transactions onCommunications, 90(11):1-4, 2007.

    10.Nan jiang and wan jiang, Random oracle model of information modeling , Worldacademy of science,18:1307-6884, 2006

    11.Steganography [tG. Pulcini, \Stegotif,"http://www.geocities.com/SiliconValley/9210/gfree. Html, 10/28/2008]

  • 8/8/2019 D Profiles Rpc346 Local Settings Application Data Mozilla Firefox Profiles Phars9r7

    60/60

    12.Vishal,Wilson and bryon, Linear,color separablehuman visual system model forvector diffusioning system, Journal of Electronic Imaging, 1:277-292, 1992.

    13. Ying Wang; Moulin, P,Statistical Signal Processing , IEEE, 56(11) : 339

    342, 2003.

    14.Mastronardi, G.; Castellano, M. Marino, Intelligent Data Acquisition andAdvanced Computing Systems IEEE,11:116 119, 2003.

    15.M. Shirali-Shahreza and M.H. Shirali-Shahreza, An Improved Version ofPersian/Arabic Text Steganography Using "La Word Proceedings of the 6th

    National Conference on Telecommunication Technologies 2008 (NCTT 2008),Putrajaya, Malaysia, August 2628, 2008.

    16. Bmp format [http://local.wasp.uwa.edu.au/~pbourke/dataformats/bmp/, 10/28/2008]

    17. Porter, Thomas; Tom Duff, Compositing Digital Images,.ComputerGraphics 18 (3): 253259, 1984.

    18. Alvy Ray Smith, Alpha and the History of Digital Compositing, Microsoft Tech

    Memo, 7:08-15, 2005.

    19. S-tools[http://www.spychecker.com/program/stools.html, 10/28/2008]

    20. Bluehills [http://www.porathcontractors.com/gallery/albums/projects/Blue_hills.sized.jpg, 10/28/2008]

    21. Sunset [http://pics.ww.com/d/199-2/Sunset_bmp.jpeg, 10/28/2008]

    22. Flower [http://www.hlevkin.com/TestImages/flower.bmp, 10/28/2008]

    23. Lena [http://www.bilsen.com/aic/tests/lena/lena.bmp, 10/28/2008]

    24. Map [http://www.blindsociety.com/blindspot/wp-ontent/uploads/2007/08/zip-code-map.bmp, 10/28/2008]

    25. Steganography [http://www.cimitan.com/blog/wp-content/murrine_rgba.png],

    26. Transparent image[http://dl.ambiweb.de/mirrors/www.libpng.org/pub/png/img_p

    ng/imgcomp- 440x330.png, 10/28/2008].