Chapter 17 Data Hiding Using Least Significant Bit Steganography in Digital Images



Download 0,6 Mb.
Pdf ko'rish
bet6/8
Sana19.11.2022
Hajmi0,6 Mb.
#868916
1   2   3   4   5   6   7   8
Bog'liq
Chapter 17

 
Step1: 
Convert the data from decimal to binary.
 
Step2:
Read Cover Image "Mansoura.bmp" as shown in Fig3, 
Fig 17.3 The cover image “Mansoura.bmp" 
 
Step3: 
Convert the Cover Image from decimal to binary. 
Step4: 
Break the byte to be hidden into bits. 
Thus [10000001] is divided into 8 bits [1 0 0 0 0 0 0 1]. 
 
Step5:
Take first 8 byte of original data from the Cover Image. 
 
 
Step6: 
Replace the least significant bit by one bit of the data to be hidden as follows,
 

First byte of original data from the Cover Image 


Chitradevi et al. 2017 ISSN: 2349 
– 4891 
148 
Statistical Approaches on Multidisciplinary Research

First bit of the data to be hidden 

Replace the least significant bit 

Repeat the replace for all bytes of Cover Image. 

Finally the cover image before and after steganography is shown in 
following figure, 
Fig 17.4Cover Image before steganography Fig 17.5 Cover Image after steganography 
The reversible perturbation of values used in steganography enables the embedding 
of data into a cover medium. Choosing to modify values that have a small affect on 
the cover medium limits the ability to detect the embedding. Embedding strategies 
may be easily derived and implemented to complicate detection and inhibit the 
retrieval of the message by a third party, while still allowing easy retrieval by the 
intended recipient. LSB Embeddings may be detected simply through visual 
inspection of an image and its bit-planes, or more reliably through methods which 
use statistical metrics to identify the likelihood an image contains hidden data. While 
an embedding may be detected, it may not be easily decoded, nor may a stego 
object be discovered due to the sheer number of images available (12).

Download 0,6 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish