Professional Documents
Culture Documents
lossless;
modulo;
shifting;
I. INTRODUCTION
In the world of modern telecommunication technologies
or with the rapid growth of science and technology, People
exchange data to each other using wired or Wireless
networks. We need to provide protection to the users data
from unauthorized access when data transferred over the
insecure communication channel. To meet this challenge, a
variety of algorithms have been proposed [2-12].
Steganography is widely used technique that hides
important data into the cover images by using some logic or
calculation on pixels of the cover image to protect the data
from illegal access. In steganography, a stego-image is
generated by hiding the secret data into a cover image then
secret data are transmitted to the destination using stegoimage. Data hiding schemes are of two types lossy and
lossless. In the first type, the data extracted from the
generated stego-image are allowed with some distortions. In
the second type, the extracted data cannot be allowed with
any distortion [13-20].
In the recovered data were distorted, but these two
methods have very high hiding capacity, for they could
conceal data of very large size. For example, Chung et al.
[13] hide the secret image in a cover image of the same size.
Wang and Tsai [14] even hide a larger secret image in a
smaller cover image. In both methods, quality of the
recovered image is acceptable, but they are not lossless. The
978-1-4799-3070-8/14 $31.00 2014 IEEE
DOI 10.1109/CSNT.2014.146
S.NO.
1
100
Data
695
65
127
Nibble
0110
0100
0100
0001
0111
1111
New
Values
15
....
....
12 13 14 15
-7
-6
-5
-4
....
....
696
Peppers
Einstein
Stego Image
Secret Image
Cover
Image
Monalisa
Einstein
PSNR
Lena
PSNR
PSNR
Proposed
Chen
Proposed
Chen
Proposed
Chen
Baboon
41.74
37.39
41.73
37.38
41.78
37.36
Houses
41.76
37.33
41.76
37.32
41.79
37.36
Baboon
Monalisa
Stego Image
41.73
37.36
41.72
37.35
41.77
37.40
Lena
41.76
37.39
41.72
37.39
41.77
37.39
Man
41.47
36.89
41.49
36.62
41.56
36.71
Houses
Chens
Lena
40.70
36.25
Einstein
40.66
36.22
Monalisa
40.70
36.27
Stego Image
Cover Image
Lina
697
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
Figure 7. Autocorrelation of Stego Image
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
Figure 8. Cross Correlation of Cover and Stego Image
IV. CONCLUSIONS
In this paper, a simple and strong steganography method
has been proposed for data security. Based on the results we
conclude that the performance of the proposed method is
good and suitable to use for data hiding in a wide range of
application. Most important features of this scheme is the
maximum difference between pixel values of cover and
stego image is 4 (m/2, m=8) . Our scheme recovers original
data successfully without any loss. Our stego image has
[17]
[18]
[19]
[20]
698