SlideShare a Scribd company logo
1 of 9
Download to read offline
Journal for Research | Volume 02 | Issue 04 | June 2016
ISSN: 2395-7549
All rights reserved by www.journalforresearch.org 49
Data Hiding by Image Steganography Appling
DNA Sequence Arithmetic & LSB Insertion
Souvik Kumar Kole Kuntal Ghosh
Department of Computer Science & Engineering Department of Computer Science & Engineering
University of Calcutta, West Bengal, India University of Calcutta, West Bengal, India
Prof. Samir Kumar Bandyopadhyay
Department of Computer Science & Engineering
University of Calcutta, West Bengal, India
Abstract
By Image Steganography we can hide the secret data in cover manner. Where present of secret information can’t realize or
visible by malicious users. In this approach Steganography procedure divided into two steps. In first step, DNA sequence
(combination of four nucleotides A, C, G & T) used to convert secret information into a key matrix by generating key. In second
step, values of key matrix will steganography by Least Significant Bit (LSB) Insertion procedure. Advantage of this procedure is
that secret information secured by secret key of DNA sequence and Steganography procedure.
Keywords: Image Steganography, DNA, LSB
_______________________________________________________________________________________________________
I. INTRODUCTION
Steganography is the process of hiding a secret message within a larger one in such a way that someone cannot know the
presence or contents of the hidden message. Although related, Steganography is not to be confused with Encryption, which is the
process of making a message unintelligible—Steganography attempts to hide the existence of communication.
The basic structure of Steganography is made up of three components: the “carrier”, the message, and the key1. The carrier
can be a painting, a digital image, an mp3, even a TCP/IP packet among other things. It is the object that will ‘carry’ the hidden
message. A key is used to decode/decipher/discover the hidden message. This can be anything from a password, a pattern, a
black-light.
Encryption is the most important component part of the infrastructure of communication security and computer security. The
relation between encryption and molecular biology was originally irrelevant, but with the in-depth study of modern
biotechnology and DNA computing, these two disciplines begin to work together more closely. DNA encryption and information
science was born after research in the field of DNA computing field by Adleman. DNA Encryption is based on biological
problems: in theory, a DNA computer will not only has the same computing power as a modern computer but will also have a
potency and function which traditional computers cannot match. First, DNA chains have a very large scale of parallelism, and its
computing speed could reach 1 billion times per second; second, the DNA molecule - as a carrier of data - has a large capacity. It
seems that one trillion bits of binary data can be stored in one cubic decimetre of a DNA solution; third, a DNA molecular
computer has low power consumption, only equal to one-billionth of a traditional computer [1].
II. RELATED WORK
Least Significant Bit Insertion
LSB insertion is one of the common and popular method for Steganography. In this method Cover-image LSB bits will alter by
Secret information.
Pixels: (00100111 11101001 11001000 11100011)
(00100111 11001000 11101001 10101100)
B: 01000010
Result: (00100110 11101001 11001000 11100010)
(00100110 11001000 11101001 10101100)
Above example shows that how to embed latter B in first eight bytes of three pixels in a 32-bits image.
Only three bits are altered out of 96 .On an average half of the bits of an image required to change for LSB insertion. Since the
8-bit letter B only requires eight bytes to hide it in, the rest of the byte of the three pixels can be used to hide others characters of
Secret-message. If substitute two or more LSB bits per byte, then it will increase the embedding capacity. But disadvantage of
this alteration is, Cover-image is more detectable. Alteration in LSB procedure only done if no statistical changes occur [2-3].
Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion
(J4R/ Volume 02 / Issue 04 / 10)
All rights reserved by www.journalforresearch.org 50
DNA Encryption:
Logic for DNA encoding and decoding:
Information can store in four DNA nucleotides (chemical bases): adenine (A), guanine (G), cytosine (C), and thymine (T). These
bases can makes pairs, A with T and C with G, to form base pairs and pairs are complement to each other. Like in binary 1 and 0
are component, so 10 and 01 are component. We use 00=A, 01=C, 10=G and 11=T. In the 8 bit grey images each pixel is
converted in DNA sequence of length 4. For example: 5th pixel value is 137, then its binary form is [10001001], then
corresponding DNA sequence is [GAGC].
Logic for addition and subtraction of DNA sequences:
Like other computing procedure DNA computing has a great impact on field of research. Addition and subtraction operation in
DNA sequences is same as binary addition and subtraction respectively, but discard carry. For example: 11+11=00, 00-
11=11.Binary representation of A, C, G, T is 00, 01, 10, 11 respectively. That is G+T=C, A-C=T ……
Addition and subtraction operation rules are shown in Table-1 and Table 2 respectively.
Table – 1
Addition Operation
Table – 2
Subtraction Operation
+ A C G T -- A C G T
A A C G T A A T G C
C C G T A C C A T G
G G T A C G G C A T
T T A C G T T G C A
Image Steganography:
Image steganography has been widely studied by researchers. There are a variety of methods used in which information can be
hidden in images. In the following section, we present the most common methods. There are three common methods of
steganography: Replacing Moderate Significant Bit, Transformation Domain Techniques, and Replacing Least Significant Bit.
Replacing Moderate Significant Bit, Chan et al. showed how to use the moderate significant bits of each pixel in the cover image
to embed the secret message. This method improves sensitivity to modification, but it degrades the quality of stego-image [3-4].
Other familiar data hiding techniques use the transformation domain of digital media to hide information discussed by Chang et
al. and Hsu et al. Functions such as the discrete cosine transform (DCT) and the discrete wavelet transform (DWT) are widely
applied by Chang et al., and Hsu et al. These methods hide the messages in the significant areas of the cover image, which makes
them robust against compression, cropping and other image processing attacks. The last method is Replacing Least Significant
Bit the concept of LSB Embedding is simple. It exploits the fact that the level of precision in many image formats is far greater
than that perceivable by average human vision. Therefore, an altered image with slight variations in its colours will be
indistinguishable from the original by a human being, just by looking at it. By using the least significant bits of the pixels’ colour
data to store the hidden message, the image itself will seem unaltered.
Procedure of This Project:
The Diagrammatical representation of Proposed Method is shown in figure 1. The corresponding algorithm is presented below.
Fig. 1: Proposed Method
Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion
(J4R/ Volume 02 / Issue 04 / 10)
All rights reserved by www.journalforresearch.org 51
Algorithm:
1) for Transformation from secret information to encrypted matrix(M)
2) Scan the secret information string from left to right.
3) Starting from 1st character.
4) Find out which one is closest among A, C, G &T in difference chart.
5) Get the corresponding decimal value of character from modified difference chart.
6) Convert decimal value in binary.
7) Store binary value into a matrix (M) in which each binary digit value will insert row wise. Matrix will contain
difference taken from which nucleotide, difference value and forward or backward difference.
8) Go to next character.
9) Repeat step-3 to 5 upto end of secret string.
10) End.
Key generation
Decimal Value of nucleotides (A, C, G and T) is the Key. Values will assign either from addition table (Table-1) or subtraction
table (Table-2) .For example if it’s coming from addition table then A= ACGT, C=CGTA, G=GTAC and T=TACG. So,
corresponding binary value A=00011011, C=01101100, G=10110001 and T=11000110.
Equivalent decimal value A=27, C=108, G=177, T=198.
Difference Chart
If key generated from addition table then difference chart as follows:
Difference Chart
A=27 B=28 C=108 D=109 E=110 F=111 G=177
H=178 I=179 J=180 K=181 L=182 M=183 N=184
O=185 P=186 Q=187 R=188 S=189 T=198 U=199
V=200 W=201 X=202 Y=203 Z=204 Space=205
Difference calculation rule
1) Rule-1: Difference from a character to next character is 1(Forward difference).
2) Rule-2: Difference from a character to previous character is 1(Backward difference).
3) Rule-3: Forward difference can be calculates from an upto B, from C upto F, from G up to M, from T up to Z.
4) Rule-4: Backward difference only calculates from T upto N. Rule-5: Difference only calculates from nucleotide.
Modified Difference Chart
A=0 B=1 C=0 D=1 E=2 F=3 G=0
H=1 I=2 J=3 K=4 L=5 M=6 N=14
O=13 P=12 Q=11 R=10 S=9 T=0 U=1
V=2 W=3 X=4 Y=5 Z=6 Space=7
Algorithm –II for Modified Least Significant Bit Replacement
This is the simplest of the steganography methods based in the use of LSB, and therefore the most vulnerable. The embedding
process consists of the sequential substitution of Least Significant Bit of a single channel of the image pixel for the bit message.
For its simplicity, this method can camouflage a great volume of information. The following steps illustrate how this method is
used to hide the secret data "A" in cover image “Mansoura.bmp ".
1) Convert the data from decimal to binary.
2) Read Cover Image "Mansoura.bmp" as shown in figure 1:
Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion
(J4R/ Volume 02 / Issue 04 / 10)
All rights reserved by www.journalforresearch.org 52
Fig. 2: The cover image “Mansoura.bmp"
Convert the Cover Image from decimal to binary.
10010000 10011010 10011100 10010010 10010110 10011101 10101111 10100101
10100000 10011011 10011111 10100010 10000101 01111011 10000101 10010001
10010000 10001101 10001101 10001010 00111101 00110111 01000001 01001111
01111000 01111011 10000011 10010000 00110010 00111101 01001010 01011100
10101010 10100111 10100111 10100110 00111101 00111011 00111000 00111011
01111000 01111101 10000011 10000100 00111101 00111011 00111011 00111011
01111100 10000101 10000111 10000011 01011000 01001100 01001101 01001100
10001010 10011001 10100111 10011010 10001011 ……….... ……….... ………....
Break the byte to be hidden into bits.
Thus [10000001] [1 0 0 0 0 0 0 1]. Is divided into 8 bits
Take each 4th
byte of original data from the Cover Image.
10010000 10011010 10011100 10010010 10010110 10011101 10101111 10100101
Replace the least significant bit by one bit of the data to be hidden.
First byte of original data from the Cover Image :
1 0 0 1 0 0 0 0
First bit of the data to be hidden :
1
Replace the least significant bit :
1 0 0 1 0 0 1 1
Repeat the replace for all bytes of Cover Image :
Finally the cover image before and after steganography is shown in figure 2.
0 100 101 0
1
Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion
(J4R/ Volume 02 / Issue 04 / 10)
All rights reserved by www.journalforresearch.org 53
Fig. 3: The cover image before and after steganography
Message Decoding Method
Fig. 4: Steps for Decoding
Result:
The output result is shown as snapshot below.
Fig. 5: Front Page.
Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion
(J4R/ Volume 02 / Issue 04 / 10)
All rights reserved by www.journalforresearch.org 54
Fig. 6: Message Input
Fig. 7: Key Matrix
Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion
(J4R/ Volume 02 / Issue 04 / 10)
All rights reserved by www.journalforresearch.org 55
Fig. 8: Cover Image Selection
Fig. 9: eneration and Download Stego-Image
Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion
(J4R/ Volume 02 / Issue 04 / 10)
All rights reserved by www.journalforresearch.org 56
Fig. 10: Decoding
Fig. 11: Image Selection
Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion
(J4R/ Volume 02 / Issue 04 / 10)
All rights reserved by www.journalforresearch.org 57
Fig. 12: Decoded Text
III. CONCLUSION
The steganography is defined as to hide information from unauthorized user. Degree of success of a steganography procedure
depends on two factors –First, amount of information hiding, second, rate of distortion of cover image. A unique method of
steganography which hidings two secret images with in a cover image. This method hides two secret images without distortion of
cover image. DNA microarray and its hybridization procedure use as a tool for implementation.
This algorithm is more efficient than most of other algorithms. The reason behind this is occurrence of change is lesser (each
4th
byte’s LSB get changed).
REFERENCES
[1] Moerland, T., “Steganography and Steganoanalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/tmoerl/privtech.pdf.
[2] https://en.wikipedia.org/wiki/DNA_sequencing
[3] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia, "Application of LSB Based Steganographic Technique for 8-bit Color Images", World Academy of
Science, Engineering and Technology 50 2009.
[4] Kuldeep Singh, Komalpreet Kaur,” Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it, “International Journal of
Computer Applications (0975 – 8887), Volume 23– No.6, June 2011.

More Related Content

What's hot

Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis pptOm Vishnoi
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 MethodKaushik Chakraborty
 
Steganalysis of lsb matching steganography
Steganalysis of lsb matching steganographySteganalysis of lsb matching steganography
Steganalysis of lsb matching steganographyAnnsona Ansilon
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESLovely Mnadal
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniquesFatema Panvelwala
 

What's hot (20)

Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography in images
Steganography  in  imagesSteganography  in  images
Steganography in images
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
Steganography: LSB technique
Steganography: LSB techniqueSteganography: LSB technique
Steganography: LSB technique
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Steganography
SteganographySteganography
Steganography
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
Steganalysis of lsb matching steganography
Steganalysis of lsb matching steganographySteganalysis of lsb matching steganography
Steganalysis of lsb matching steganography
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
SteganalysisPres
SteganalysisPresSteganalysisPres
SteganalysisPres
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
 
Steganography and its techniques
Steganography and its techniquesSteganography and its techniques
Steganography and its techniques
 

Viewers also liked

Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding dataSarin Thapa
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Jitu Choudhary
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...IOSR Journals
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONManush Desai
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
Steganography document
Steganography documentSteganography document
Steganography documentBSheghembe
 
Steganography Project
Steganography Project Steganography Project
Steganography Project Uttam Jain
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentationAshwin Prasad
 
Steganography
Steganography Steganography
Steganography Uttam Jain
 
Audio steganography
Audio steganography Audio steganography
Audio steganography Sharath Reddy
 

Viewers also liked (14)

Steganography
SteganographySteganography
Steganography
 
Steganography - The art of hiding data
Steganography - The art of hiding dataSteganography - The art of hiding data
Steganography - The art of hiding data
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...Hide and Seek: Embedding Audio into RGB 24-bit Color Image  Sporadically Usin...
Hide and Seek: Embedding Audio into RGB 24-bit Color Image Sporadically Usin...
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
AUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATIONAUDIO STEGANOGRAPHY PRESENTATION
AUDIO STEGANOGRAPHY PRESENTATION
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
Audio steganography - LSB
Audio steganography - LSBAudio steganography - LSB
Audio steganography - LSB
 
Steganography document
Steganography documentSteganography document
Steganography document
 
Steganography Project
Steganography Project Steganography Project
Steganography Project
 
Steganography presentation
Steganography presentationSteganography presentation
Steganography presentation
 
Steganography
Steganography Steganography
Steganography
 
Audio steganography
Audio steganography Audio steganography
Audio steganography
 

Similar to DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSERTION

DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...IOSR Journals
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences cscpconf
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication cscpconf
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERcscpconf
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit GoelMohit Goel
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSEditor IJMTER
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsCSCJournals
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAnkita Dubey
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganographyIAEME Publication
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...IJNSA Journal
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONijcseit
 

Similar to DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSERTION (20)

DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
DCT based Steganographic Evaluation parameter analysis in Frequency domain by...
 
J017156874
J017156874J017156874
J017156874
 
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences An Uncompressed Image Encryption Algorithm Based on DNA Sequences
An Uncompressed Image Encryption Algorithm Based on DNA Sequences
 
A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication A Hybrid Approach for Ensuring Security in Data Communication
A Hybrid Approach for Ensuring Security in Data Communication
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHERSELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
SELECTIVE IMAGE ENCRYPTION USING DCT WITH AES CIPHER
 
A novel steganographic technique based on lsb dct approach by Mohit Goel
A novel steganographic technique based on lsb dct approach  by Mohit GoelA novel steganographic technique based on lsb dct approach  by Mohit Goel
A novel steganographic technique based on lsb dct approach by Mohit Goel
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
F010232834
F010232834F010232834
F010232834
 
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYSA NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
A NEW ALGORITHM FOR DATA HIDING USING OPAP AND MULTIPLE KEYS
 
Reversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency DomainsReversible Data Hiding in the Spatial and Frequency Domains
Reversible Data Hiding in the Spatial and Frequency Domains
 
Advanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubeyAdvanced image processing notes ankita_dubey
Advanced image processing notes ankita_dubey
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Modified weighted embedding method for image steganography
Modified  weighted embedding method for image steganographyModified  weighted embedding method for image steganography
Modified weighted embedding method for image steganography
 
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
AN EFFICIENT M-ARY QIM DATA HIDING ALGORITHM FOR THE APPLICATION TO IMAGE ERR...
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTIONAN ENHANCED CHAOTIC IMAGE ENCRYPTION
AN ENHANCED CHAOTIC IMAGE ENCRYPTION
 

More from Journal For Research

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Journal For Research
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Journal For Research
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Journal For Research
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016Journal For Research
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...Journal For Research
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014Journal For Research
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...Journal For Research
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...Journal For Research
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012Journal For Research
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...Journal For Research
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009Journal For Research
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008Journal For Research
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002Journal For Research
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001Journal For Research
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021Journal For Research
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...Journal For Research
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023Journal For Research
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024Journal For Research
 

More from Journal For Research (20)

Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
Design and Analysis of Hydraulic Actuator in a Typical Aerospace vehicle | J4...
 
Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...Experimental Verification and Validation of Stress Distribution of Composite ...
Experimental Verification and Validation of Stress Distribution of Composite ...
 
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
Image Binarization for the uses of Preprocessing to Detect Brain Abnormality ...
 
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
A Research Paper on BFO and PSO Based Movie Recommendation System | J4RV4I1016
 
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
IoT based Digital Agriculture Monitoring System and Their Impact on Optimal U...
 
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015
 
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
HCI BASED APPLICATION FOR PLAYING COMPUTER GAMES | J4RV4I1014
 
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
A REVIEW ON DESIGN OF PUBLIC TRANSPORTATION SYSTEM IN CHANDRAPUR CITY | J4RV4...
 
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
A REVIEW ON LIFTING AND ASSEMBLY OF ROTARY KILN TYRE WITH SHELL BY FLEXIBLE G...
 
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
LABORATORY STUDY OF STRONG, MODERATE AND WEAK SANDSTONES | J4RV4I1012
 
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
DESIGN ANALYSIS AND FABRICATION OF MANUAL RICE TRANSPLANTING MACHINE | J4RV4I...
 
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
AN OVERVIEW: DAKNET TECHNOLOGY - BROADBAND AD-HOC CONNECTIVITY | J4RV4I1009
 
LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010LINE FOLLOWER ROBOT | J4RV4I1010
LINE FOLLOWER ROBOT | J4RV4I1010
 
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
CHATBOT FOR COLLEGE RELATED QUERIES | J4RV4I1008
 
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
AN INTEGRATED APPROACH TO REDUCE INTRA CITY TRAFFIC AT COIMBATORE | J4RV4I1002
 
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
A REVIEW STUDY ON GAS-SOLID CYCLONE SEPARATOR USING LAPPLE MODEL | J4RV4I1001
 
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
IMAGE SEGMENTATION USING FCM ALGORITM | J4RV3I12021
 
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
USE OF GALVANIZED STEELS FOR AUTOMOTIVE BODY- CAR SURVEY RESULTS AT COASTAL A...
 
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
UNMANNED AERIAL VEHICLE FOR REMITTANCE | J4RV3I12023
 
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
SURVEY ON A MODERN MEDICARE SYSTEM USING INTERNET OF THINGS | J4RV3I12024
 

Recently uploaded

Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 

Recently uploaded (20)

YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 

DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSERTION

  • 1. Journal for Research | Volume 02 | Issue 04 | June 2016 ISSN: 2395-7549 All rights reserved by www.journalforresearch.org 49 Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion Souvik Kumar Kole Kuntal Ghosh Department of Computer Science & Engineering Department of Computer Science & Engineering University of Calcutta, West Bengal, India University of Calcutta, West Bengal, India Prof. Samir Kumar Bandyopadhyay Department of Computer Science & Engineering University of Calcutta, West Bengal, India Abstract By Image Steganography we can hide the secret data in cover manner. Where present of secret information can’t realize or visible by malicious users. In this approach Steganography procedure divided into two steps. In first step, DNA sequence (combination of four nucleotides A, C, G & T) used to convert secret information into a key matrix by generating key. In second step, values of key matrix will steganography by Least Significant Bit (LSB) Insertion procedure. Advantage of this procedure is that secret information secured by secret key of DNA sequence and Steganography procedure. Keywords: Image Steganography, DNA, LSB _______________________________________________________________________________________________________ I. INTRODUCTION Steganography is the process of hiding a secret message within a larger one in such a way that someone cannot know the presence or contents of the hidden message. Although related, Steganography is not to be confused with Encryption, which is the process of making a message unintelligible—Steganography attempts to hide the existence of communication. The basic structure of Steganography is made up of three components: the “carrier”, the message, and the key1. The carrier can be a painting, a digital image, an mp3, even a TCP/IP packet among other things. It is the object that will ‘carry’ the hidden message. A key is used to decode/decipher/discover the hidden message. This can be anything from a password, a pattern, a black-light. Encryption is the most important component part of the infrastructure of communication security and computer security. The relation between encryption and molecular biology was originally irrelevant, but with the in-depth study of modern biotechnology and DNA computing, these two disciplines begin to work together more closely. DNA encryption and information science was born after research in the field of DNA computing field by Adleman. DNA Encryption is based on biological problems: in theory, a DNA computer will not only has the same computing power as a modern computer but will also have a potency and function which traditional computers cannot match. First, DNA chains have a very large scale of parallelism, and its computing speed could reach 1 billion times per second; second, the DNA molecule - as a carrier of data - has a large capacity. It seems that one trillion bits of binary data can be stored in one cubic decimetre of a DNA solution; third, a DNA molecular computer has low power consumption, only equal to one-billionth of a traditional computer [1]. II. RELATED WORK Least Significant Bit Insertion LSB insertion is one of the common and popular method for Steganography. In this method Cover-image LSB bits will alter by Secret information. Pixels: (00100111 11101001 11001000 11100011) (00100111 11001000 11101001 10101100) B: 01000010 Result: (00100110 11101001 11001000 11100010) (00100110 11001000 11101001 10101100) Above example shows that how to embed latter B in first eight bytes of three pixels in a 32-bits image. Only three bits are altered out of 96 .On an average half of the bits of an image required to change for LSB insertion. Since the 8-bit letter B only requires eight bytes to hide it in, the rest of the byte of the three pixels can be used to hide others characters of Secret-message. If substitute two or more LSB bits per byte, then it will increase the embedding capacity. But disadvantage of this alteration is, Cover-image is more detectable. Alteration in LSB procedure only done if no statistical changes occur [2-3].
  • 2. Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion (J4R/ Volume 02 / Issue 04 / 10) All rights reserved by www.journalforresearch.org 50 DNA Encryption: Logic for DNA encoding and decoding: Information can store in four DNA nucleotides (chemical bases): adenine (A), guanine (G), cytosine (C), and thymine (T). These bases can makes pairs, A with T and C with G, to form base pairs and pairs are complement to each other. Like in binary 1 and 0 are component, so 10 and 01 are component. We use 00=A, 01=C, 10=G and 11=T. In the 8 bit grey images each pixel is converted in DNA sequence of length 4. For example: 5th pixel value is 137, then its binary form is [10001001], then corresponding DNA sequence is [GAGC]. Logic for addition and subtraction of DNA sequences: Like other computing procedure DNA computing has a great impact on field of research. Addition and subtraction operation in DNA sequences is same as binary addition and subtraction respectively, but discard carry. For example: 11+11=00, 00- 11=11.Binary representation of A, C, G, T is 00, 01, 10, 11 respectively. That is G+T=C, A-C=T …… Addition and subtraction operation rules are shown in Table-1 and Table 2 respectively. Table – 1 Addition Operation Table – 2 Subtraction Operation + A C G T -- A C G T A A C G T A A T G C C C G T A C C A T G G G T A C G G C A T T T A C G T T G C A Image Steganography: Image steganography has been widely studied by researchers. There are a variety of methods used in which information can be hidden in images. In the following section, we present the most common methods. There are three common methods of steganography: Replacing Moderate Significant Bit, Transformation Domain Techniques, and Replacing Least Significant Bit. Replacing Moderate Significant Bit, Chan et al. showed how to use the moderate significant bits of each pixel in the cover image to embed the secret message. This method improves sensitivity to modification, but it degrades the quality of stego-image [3-4]. Other familiar data hiding techniques use the transformation domain of digital media to hide information discussed by Chang et al. and Hsu et al. Functions such as the discrete cosine transform (DCT) and the discrete wavelet transform (DWT) are widely applied by Chang et al., and Hsu et al. These methods hide the messages in the significant areas of the cover image, which makes them robust against compression, cropping and other image processing attacks. The last method is Replacing Least Significant Bit the concept of LSB Embedding is simple. It exploits the fact that the level of precision in many image formats is far greater than that perceivable by average human vision. Therefore, an altered image with slight variations in its colours will be indistinguishable from the original by a human being, just by looking at it. By using the least significant bits of the pixels’ colour data to store the hidden message, the image itself will seem unaltered. Procedure of This Project: The Diagrammatical representation of Proposed Method is shown in figure 1. The corresponding algorithm is presented below. Fig. 1: Proposed Method
  • 3. Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion (J4R/ Volume 02 / Issue 04 / 10) All rights reserved by www.journalforresearch.org 51 Algorithm: 1) for Transformation from secret information to encrypted matrix(M) 2) Scan the secret information string from left to right. 3) Starting from 1st character. 4) Find out which one is closest among A, C, G &T in difference chart. 5) Get the corresponding decimal value of character from modified difference chart. 6) Convert decimal value in binary. 7) Store binary value into a matrix (M) in which each binary digit value will insert row wise. Matrix will contain difference taken from which nucleotide, difference value and forward or backward difference. 8) Go to next character. 9) Repeat step-3 to 5 upto end of secret string. 10) End. Key generation Decimal Value of nucleotides (A, C, G and T) is the Key. Values will assign either from addition table (Table-1) or subtraction table (Table-2) .For example if it’s coming from addition table then A= ACGT, C=CGTA, G=GTAC and T=TACG. So, corresponding binary value A=00011011, C=01101100, G=10110001 and T=11000110. Equivalent decimal value A=27, C=108, G=177, T=198. Difference Chart If key generated from addition table then difference chart as follows: Difference Chart A=27 B=28 C=108 D=109 E=110 F=111 G=177 H=178 I=179 J=180 K=181 L=182 M=183 N=184 O=185 P=186 Q=187 R=188 S=189 T=198 U=199 V=200 W=201 X=202 Y=203 Z=204 Space=205 Difference calculation rule 1) Rule-1: Difference from a character to next character is 1(Forward difference). 2) Rule-2: Difference from a character to previous character is 1(Backward difference). 3) Rule-3: Forward difference can be calculates from an upto B, from C upto F, from G up to M, from T up to Z. 4) Rule-4: Backward difference only calculates from T upto N. Rule-5: Difference only calculates from nucleotide. Modified Difference Chart A=0 B=1 C=0 D=1 E=2 F=3 G=0 H=1 I=2 J=3 K=4 L=5 M=6 N=14 O=13 P=12 Q=11 R=10 S=9 T=0 U=1 V=2 W=3 X=4 Y=5 Z=6 Space=7 Algorithm –II for Modified Least Significant Bit Replacement This is the simplest of the steganography methods based in the use of LSB, and therefore the most vulnerable. The embedding process consists of the sequential substitution of Least Significant Bit of a single channel of the image pixel for the bit message. For its simplicity, this method can camouflage a great volume of information. The following steps illustrate how this method is used to hide the secret data "A" in cover image “Mansoura.bmp ". 1) Convert the data from decimal to binary. 2) Read Cover Image "Mansoura.bmp" as shown in figure 1:
  • 4. Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion (J4R/ Volume 02 / Issue 04 / 10) All rights reserved by www.journalforresearch.org 52 Fig. 2: The cover image “Mansoura.bmp" Convert the Cover Image from decimal to binary. 10010000 10011010 10011100 10010010 10010110 10011101 10101111 10100101 10100000 10011011 10011111 10100010 10000101 01111011 10000101 10010001 10010000 10001101 10001101 10001010 00111101 00110111 01000001 01001111 01111000 01111011 10000011 10010000 00110010 00111101 01001010 01011100 10101010 10100111 10100111 10100110 00111101 00111011 00111000 00111011 01111000 01111101 10000011 10000100 00111101 00111011 00111011 00111011 01111100 10000101 10000111 10000011 01011000 01001100 01001101 01001100 10001010 10011001 10100111 10011010 10001011 ……….... ……….... ……….... Break the byte to be hidden into bits. Thus [10000001] [1 0 0 0 0 0 0 1]. Is divided into 8 bits Take each 4th byte of original data from the Cover Image. 10010000 10011010 10011100 10010010 10010110 10011101 10101111 10100101 Replace the least significant bit by one bit of the data to be hidden. First byte of original data from the Cover Image : 1 0 0 1 0 0 0 0 First bit of the data to be hidden : 1 Replace the least significant bit : 1 0 0 1 0 0 1 1 Repeat the replace for all bytes of Cover Image : Finally the cover image before and after steganography is shown in figure 2. 0 100 101 0 1
  • 5. Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion (J4R/ Volume 02 / Issue 04 / 10) All rights reserved by www.journalforresearch.org 53 Fig. 3: The cover image before and after steganography Message Decoding Method Fig. 4: Steps for Decoding Result: The output result is shown as snapshot below. Fig. 5: Front Page.
  • 6. Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion (J4R/ Volume 02 / Issue 04 / 10) All rights reserved by www.journalforresearch.org 54 Fig. 6: Message Input Fig. 7: Key Matrix
  • 7. Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion (J4R/ Volume 02 / Issue 04 / 10) All rights reserved by www.journalforresearch.org 55 Fig. 8: Cover Image Selection Fig. 9: eneration and Download Stego-Image
  • 8. Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion (J4R/ Volume 02 / Issue 04 / 10) All rights reserved by www.journalforresearch.org 56 Fig. 10: Decoding Fig. 11: Image Selection
  • 9. Data Hiding by Image Steganography Appling DNA Sequence Arithmetic & LSB Insertion (J4R/ Volume 02 / Issue 04 / 10) All rights reserved by www.journalforresearch.org 57 Fig. 12: Decoded Text III. CONCLUSION The steganography is defined as to hide information from unauthorized user. Degree of success of a steganography procedure depends on two factors –First, amount of information hiding, second, rate of distortion of cover image. A unique method of steganography which hidings two secret images with in a cover image. This method hides two secret images without distortion of cover image. DNA microarray and its hybridization procedure use as a tool for implementation. This algorithm is more efficient than most of other algorithms. The reason behind this is occurrence of change is lesser (each 4th byte’s LSB get changed). REFERENCES [1] Moerland, T., “Steganography and Steganoanalysis”, Leiden Institute of Advanced Computing Science, www.liacs.nl/home/tmoerl/privtech.pdf. [2] https://en.wikipedia.org/wiki/DNA_sequencing [3] Mamta Juneja, Parvinder S. Sandhu, and Ekta Walia, "Application of LSB Based Steganographic Technique for 8-bit Color Images", World Academy of Science, Engineering and Technology 50 2009. [4] Kuldeep Singh, Komalpreet Kaur,” Image Encryption using Chaotic Maps and DNA Addition Operation and Noise Effects on it, “International Journal of Computer Applications (0975 – 8887), Volume 23– No.6, June 2011.