Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
edge adaptive image steganography based on lsb matching revisited

hi,this is kavitha im doing a project on edge adaptive image steganography based on lsb matching revisited,im having abstract and requirements ,i need source code for my project

The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis and extensive experiments, especially for those images with many smooth regions.[/u]
In this paper, we expand the LSB matching revisited image steganography and propose an edge adaptive scheme which can select the embedding regions according to the size of secret message and he difference between two consecutive pixels in the cover image. For lower embedding rates, only sharper edge regions are used while keeping the other smoother regions as they are. When the embedding rate increases, more edge regions can be released adaptively for data hiding by adjusting just a few parameters. The experimental results evaluated on 6000 natural images with three specific and four universal steganalytic algorithms show that the new scheme can enhance the security significantly compared with typical LSB-based approaches as well as their edge adaptive ones, such as pixel-value-differencing-based approaches, while preserving higher visual quality of stage images at the same time.


STEGANOGRAPHY is a technique for information hiding. It aims to embed secret data into a digital cover media, suchvas digital audio, image, video, etc., without being suspicious. steganalysis aims to expose the presence of hidden secret messages in those stego media.

the common approaches used to detect LSB replacement are totally ineffective at detecting the LSBM.
Existing System:

Steganalytic algorithms, such as the RS analysis LSB replacement is a well-known steganographic method. In this embedding scheme, only the LSB plane of the cover image is overwritten with the secret bit stream according to a pseudorandom number generator (PRNG)

In this section, we first give a brief overview of the typical LSB-based approaches including LSB replacement, LSBM, and LSBMR, and some adaptive schemes including the original PVD scheme, the improved version of PVD (IPVD), adaptive edges with LSB (AE-LSB), and hiding behind corners (HBC) , and then show some image examples to expose the limitations of these existing schemes. Finally we propose some strategies to overcome these limitations.
Proposed system:

The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain.

LSB matching (LSBM) employs a minor modification to LSB replacement. If the secret bit does not match the LSB of the cover image, then or is randomly added to the corresponding
pixel value. Statistically, the probability of increasing or decreasing for each modified pixel value is the same and so the obvious asymmetry artifacts introduced by LSB replacement
can be easily avoided
architecture :

In the LSB replacement and LSBM approaches, the embedding process is very similar. Given a secret bit stream to be embedded, a traveling order in the cover image is first generated by a PRNG, and then each pixel along the traveling order is dealt with separately. For LSB replacement, the secret bit simply overwrites the LSB of the pixel, i.e., the first bit plane, while the higher bit planes are preserved. For the LSBM scheme, if the secret bit is not equal to the LSB of the given pixel, then 1 is added randomly to the pixel while keeping the altered pixel in the range of . In such a way, the LSB of pixels along the traveling order will match the secret bit stream after data hiding both for LSB replacement and LSBM.
System Configuration
Hardware requirements :
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 15 VGA Colour.
Mouse : Logitech.
Ram : 512 MB.
Software requirements:
Operating system : Windows XP Professional.
Coding Language : Java

to get information about the topic Steganography In Images full report,ppt and related topic refer the page link bellow

Forum Jump:

Users browsing this thread:
1 Guest(s)

Powered By MyBB, © 2002-2024 iAndrew & Melroy van den Berg.