SlideShare una empresa de Scribd logo
1 de 12
A novel data embedding
method using adaptive pixel
pair matching…….
Presented by:
RENUKA VERMA.
(REG NO:3470910288)
RESHMA BADAL.
(REG NO:3470910290)
DEPT:ECE-C
BATCH NO: ECEC(10)
Guided by:
MR. P.SUBRAMANIAN
(ASSOCIATE PROFESSOR)
ECE DEPT
ABSTRACT
This paper proposes a new data-hiding
method based on pixel pair matching (PPM).
The basic idea of PPM is to use the values of
pixel pair as a reference coordinate, and
search a coordinate in the neighborhood set of
this pixel pair according to a given message
digit.
The pixel pair is then replaced by the searched
coordinate to conceal the digit.

 Exploiting modification direction (EMD) and
diamond encoding (DE) are two data-hiding
methods proposed recently based on PPM.


 The maximum capacity of EMD is 1.161 bpp
and DE extends the payload of EMD by
embedding digits in a larger notational system.
The proposed method offers lower distortion than DE by
providing more compact neighborhood sets and allowing
embedded digits in any notational system.



 Compared with the optimal pixel adjustment process
(OPAP) method, the proposed method always has lower
distortion for various payloads.


Experimental results reveal that the proposed method not
only provides better performance than those of OPAP and
DE, but also is secure under the detection of some well-
known steganalysis techniques.
OBJECTIVE

   This project is a data hiding method based
    on PPM..

    Exploiting modification direction (EMD)
    and diamond encoding (DE) are two data-
    hiding methods proposed based on PPM.
SYSTEM ACHITECTURE:
           SENDER

LOGIN
DETAIL     LOGIN


                     SECRET    ADAPTIVE
           COVER
                      DATA     PIXEL PAIR
           IMAGE
                               MATCHING



SECRET      COVER                STEGO
 DATA               RECEIVER
            IMAGE                IMAGE
EXISTING SYSTEM:

   Least significant bit substitution method.



   This method is easy to implement with
    low CPU cost.
DISADVANTAGES OF
      EXISTING SYSTEM:

   Imbalanced embedding distortion
    emerges and is vulnerable to steganalysis.



   The existing technique can be easily
    cracked.
PROPOSED SYSTEM:

   Exploiting modification direction (EMD)
    and diamond encoding (DE) are two
    data-hiding methods proposed recently
    based on PPM.
ADVANTAGES OF
       PROPOSED SYSTEM:


    better performance than those of OPAP
    and DE.

    secure under the detection of some well-
    known steganalysis techniques.
REFERENCE:

   Wien Hong and Tung-Shou Chen, “A Novel Data Embedding
    Method Using Adaptive Pixel Pair Matching” , IEEE
    TRANSACTIONS ON INFORMATION FORENSICS AND
    SECURITY,VOL. 7, NO. 1, FEBRUARY 2012.
 J.Fridrich, Steganography in Digital Media: Principles, Algorithms,
    and Applications. Cambridge, U.K.: Cambridge Univ. Press, 2009.
 N. Provos and P. Honeyman, “Hide and seek: An introduction
  to steganography,” IEEE Security Privacy, vol. 3, no. 3, pp. 32–
  44,May/Jun. 2003.
 A. Cheddad, J. Condell, K. Curran, and P. McKevitt, “Digital
  image
  steganography: Survey and analysis of current methods,”
  Signal Process., vol. 90, pp. 727–752, 2010.
A novel data embedding method using adaptive pixel

Más contenido relacionado

La actualidad más candente

Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryptionAashish R
 
Image steganography
Image steganographyImage steganography
Image steganographyvaidya_sanyu
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Designing an efficient image encryption then-compression system via predictio...
Designing an efficient image encryption then-compression system via predictio...Designing an efficient image encryption then-compression system via predictio...
Designing an efficient image encryption then-compression system via predictio...LeMeniz Infotech
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...chennaijp
 
designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...swathi78
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
Secure communication based on ambient audio
Secure communication based on ambient audioSecure communication based on ambient audio
Secure communication based on ambient audioEcway Technologies
 
Weather forecasting by anfis
Weather forecasting by anfisWeather forecasting by anfis
Weather forecasting by anfisDUAA J. IBRAHIM
 
Reversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulationReversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulationAswin Raju
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniqueAncy Mariam Babu
 
Presentation i
Presentation iPresentation i
Presentation inidhip216
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET Journal
 

La actualidad más candente (20)

Image Encryption in java ppt.
Image Encryption in java ppt.Image Encryption in java ppt.
Image Encryption in java ppt.
 
Image encryption and decryption
Image encryption and decryptionImage encryption and decryption
Image encryption and decryption
 
Image steganography
Image steganographyImage steganography
Image steganography
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Designing an efficient image encryption then-compression system via predictio...
Designing an efficient image encryption then-compression system via predictio...Designing an efficient image encryption then-compression system via predictio...
Designing an efficient image encryption then-compression system via predictio...
 
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...JPM1404   Designing an Efficient Image Encryption-Then-Compression System via...
JPM1404 Designing an Efficient Image Encryption-Then-Compression System via...
 
designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...designing an efficient image encryption-then-compression system via predictio...
designing an efficient image encryption-then-compression system via predictio...
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Artificial neural network
Artificial neural networkArtificial neural network
Artificial neural network
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
Secure communication based on ambient audio
Secure communication based on ambient audioSecure communication based on ambient audio
Secure communication based on ambient audio
 
Weather forecasting by anfis
Weather forecasting by anfisWeather forecasting by anfis
Weather forecasting by anfis
 
Reversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulationReversible image data hiding over encrypted domain using key modulation
Reversible image data hiding over encrypted domain using key modulation
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
Performance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption techniquePerformance evluvation of chaotic encryption technique
Performance evluvation of chaotic encryption technique
 
Presentation i
Presentation iPresentation i
Presentation i
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
IRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data SecurityIRJET- Machine Learning Application for Data Security
IRJET- Machine Learning Application for Data Security
 

Destacado

Medical Imaging Seminar Session 2
Medical Imaging Seminar Session 2Medical Imaging Seminar Session 2
Medical Imaging Seminar Session 2Space IDEAS Hub
 
IMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
IMAGE PROCESSING - MATHANKUMAR.S - VMKVECIMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
IMAGE PROCESSING - MATHANKUMAR.S - VMKVECMathankumar S
 
Digital imaging with charge coupled devices
Digital imaging with charge coupled devicesDigital imaging with charge coupled devices
Digital imaging with charge coupled devicesSteven Shaw
 
Data Explosion in Medical Imaging
Data Explosion in Medical ImagingData Explosion in Medical Imaging
Data Explosion in Medical ImagingShourya Sarcar
 
introduction_to_medical_imaging
introduction_to_medical_imagingintroduction_to_medical_imaging
introduction_to_medical_imagingrezgar Shahi
 
#6 PyData Warsaw: Deep learning for image segmentation
#6 PyData Warsaw: Deep learning for image segmentation#6 PyData Warsaw: Deep learning for image segmentation
#6 PyData Warsaw: Deep learning for image segmentationMatthew Opala
 
Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Guillaume Gales
 
Introduction to Medical Imaging (informatics approach)
Introduction to Medical Imaging (informatics approach)Introduction to Medical Imaging (informatics approach)
Introduction to Medical Imaging (informatics approach)Farzad Jahedi
 
Medical imaging summary 1
Medical imaging summary 1Medical imaging summary 1
Medical imaging summary 1sirrainbow
 
Pp3 - Pixel Perfect Precision V3
Pp3 - Pixel Perfect Precision V3Pp3 - Pixel Perfect Precision V3
Pp3 - Pixel Perfect Precision V3Olybop .fr
 

Destacado (20)

dress for success
dress for success dress for success
dress for success
 
Lawrence Du Seattle Final
Lawrence Du Seattle FinalLawrence Du Seattle Final
Lawrence Du Seattle Final
 
Medical Imaging Seminar Session 2
Medical Imaging Seminar Session 2Medical Imaging Seminar Session 2
Medical Imaging Seminar Session 2
 
Glossary
GlossaryGlossary
Glossary
 
crfasrnn_presentation
crfasrnn_presentationcrfasrnn_presentation
crfasrnn_presentation
 
IMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
IMAGE PROCESSING - MATHANKUMAR.S - VMKVECIMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
IMAGE PROCESSING - MATHANKUMAR.S - VMKVEC
 
Digital imaging with charge coupled devices
Digital imaging with charge coupled devicesDigital imaging with charge coupled devices
Digital imaging with charge coupled devices
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar ppt
 
Data Explosion in Medical Imaging
Data Explosion in Medical ImagingData Explosion in Medical Imaging
Data Explosion in Medical Imaging
 
introduction_to_medical_imaging
introduction_to_medical_imagingintroduction_to_medical_imaging
introduction_to_medical_imaging
 
Dip review
Dip reviewDip review
Dip review
 
#6 PyData Warsaw: Deep learning for image segmentation
#6 PyData Warsaw: Deep learning for image segmentation#6 PyData Warsaw: Deep learning for image segmentation
#6 PyData Warsaw: Deep learning for image segmentation
 
Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)Pixel Matching from Stereo Images (Callan seminar)
Pixel Matching from Stereo Images (Callan seminar)
 
Raskar Computational Camera Fall 2009 Lecture 01
Raskar Computational Camera Fall 2009 Lecture 01Raskar Computational Camera Fall 2009 Lecture 01
Raskar Computational Camera Fall 2009 Lecture 01
 
Introduction to Medical Imaging
Introduction to Medical ImagingIntroduction to Medical Imaging
Introduction to Medical Imaging
 
Image denoising
Image denoisingImage denoising
Image denoising
 
Stegnography
StegnographyStegnography
Stegnography
 
Introduction to Medical Imaging (informatics approach)
Introduction to Medical Imaging (informatics approach)Introduction to Medical Imaging (informatics approach)
Introduction to Medical Imaging (informatics approach)
 
Medical imaging summary 1
Medical imaging summary 1Medical imaging summary 1
Medical imaging summary 1
 
Pp3 - Pixel Perfect Precision V3
Pp3 - Pixel Perfect Precision V3Pp3 - Pixel Perfect Precision V3
Pp3 - Pixel Perfect Precision V3
 

Similar a A novel data embedding method using adaptive pixel

A novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matchingA novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matchingJPINFOTECH JAYAPRAKASH
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...IJCNCJournal
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...IJCNCJournal
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...IRJET Journal
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystManish Myst
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Imagesijsrd.com
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 

Similar a A novel data embedding method using adaptive pixel (20)

A novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matchingA novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matching
 
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
Developing Algorithms for Image Steganography and Increasing the Capacity Dep...
 
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
DEVELOPING ALGORITHMS FOR IMAGE STEGANOGRAPHY AND INCREASING THE CAPACITY DEP...
 
C010231217
C010231217C010231217
C010231217
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
Hybrid Approach for Improving Data Security and Size Reduction in Image Stega...
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
G017444651
G017444651G017444651
G017444651
 
Q180304102109
Q180304102109Q180304102109
Q180304102109
 
O017429398
O017429398O017429398
O017429398
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Thesis on Image compression by Manish Myst
Thesis on Image compression by Manish MystThesis on Image compression by Manish Myst
Thesis on Image compression by Manish Myst
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
A Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted ImagesA Survey on Different Data Hiding Techniques in Encrypted Images
A Survey on Different Data Hiding Techniques in Encrypted Images
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
P017329498
P017329498P017329498
P017329498
 

A novel data embedding method using adaptive pixel

  • 1. A novel data embedding method using adaptive pixel pair matching……. Presented by: RENUKA VERMA. (REG NO:3470910288) RESHMA BADAL. (REG NO:3470910290) DEPT:ECE-C BATCH NO: ECEC(10) Guided by: MR. P.SUBRAMANIAN (ASSOCIATE PROFESSOR) ECE DEPT
  • 2. ABSTRACT This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit.
  • 3. The pixel pair is then replaced by the searched coordinate to conceal the digit.  Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM.  The maximum capacity of EMD is 1.161 bpp and DE extends the payload of EMD by embedding digits in a larger notational system.
  • 4. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits in any notational system.  Compared with the optimal pixel adjustment process (OPAP) method, the proposed method always has lower distortion for various payloads. Experimental results reveal that the proposed method not only provides better performance than those of OPAP and DE, but also is secure under the detection of some well- known steganalysis techniques.
  • 5. OBJECTIVE  This project is a data hiding method based on PPM..  Exploiting modification direction (EMD) and diamond encoding (DE) are two data- hiding methods proposed based on PPM.
  • 6. SYSTEM ACHITECTURE: SENDER LOGIN DETAIL LOGIN SECRET ADAPTIVE COVER DATA PIXEL PAIR IMAGE MATCHING SECRET COVER STEGO DATA RECEIVER IMAGE IMAGE
  • 7. EXISTING SYSTEM:  Least significant bit substitution method.  This method is easy to implement with low CPU cost.
  • 8. DISADVANTAGES OF EXISTING SYSTEM:  Imbalanced embedding distortion emerges and is vulnerable to steganalysis.  The existing technique can be easily cracked.
  • 9. PROPOSED SYSTEM:  Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM.
  • 10. ADVANTAGES OF PROPOSED SYSTEM:  better performance than those of OPAP and DE.  secure under the detection of some well- known steganalysis techniques.
  • 11. REFERENCE:  Wien Hong and Tung-Shou Chen, “A Novel Data Embedding Method Using Adaptive Pixel Pair Matching” , IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY,VOL. 7, NO. 1, FEBRUARY 2012.  J.Fridrich, Steganography in Digital Media: Principles, Algorithms, and Applications. Cambridge, U.K.: Cambridge Univ. Press, 2009.  N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy, vol. 3, no. 3, pp. 32– 44,May/Jun. 2003.  A. Cheddad, J. Condell, K. Curran, and P. McKevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Process., vol. 90, pp. 727–752, 2010.