Journal Paper 1 7
Journal Paper 1 7
Image Embedding
Hari Krishnan M Mohamed Azim J H
Assistant
UG Scholar
Professor
Department of Computer Science and Engineering
Department of Computer Science and Engineering
Panimalar Engineering College
Panimalar Engineering College
Chennai, India
Chennai, India
mohamedazim017@gmail.com
harik1595@gmail.com
Naresh K
Mohammed Yousuf S UG Scholar
UG Scholar
Department of Computer Science and Engineering
Department of Computer Science and Engineering Panimalar Engineering College
Panimalar Engineering College
Chennai, India
Chennai, India nareshkaruppaiyan123@gmail.com
yousufaasik1805@gmail.com
The proposed system introduces an advanced and user- Error Recovery 40% 90%
centric approach to steganography, aiming to address the Usability 50% 95%
limitations of traditional methods by focusing on
imperceptibility, robustness, and usability. It employs an Resilience to 55% 88%
enhanced least significant bit (LSB) embedding technique Compression and
tailored for high-resolution, lossless image formats such as Resizing
BMP and PNG. This ensures that the embedded data remains Table 1: Performance Metrics
visually undetectable, preserving the carrier image’s original
quality. Unlike conventional systems that often produce In addition to its functionality, the system is
noticeable artifacts, the proposed system prioritizes high- optimized for computational efficiency, making it
quality outputs, evaluated using metrics like Peak Signal-to- capable of handling real-time applications. The system's
Noise Ratio (PSNR) and Structural Similarity Index (SSIM), optimized embedding and retrieval processes result in a
achieving values that surpass 50 dB and 0.95, respectively. processing time reduction of up to 40% compared to
traditional methods. It provides a secure, efficient, and
The proposed system ensures robustness by incorporating scalable solution for modern steganographic needs. By
metadata and error-correction codes, enhancing its ability to addressing the weaknesses of conventional systems and
withstand various transformations and errors. The embedded integrating advanced features, it establishes itself as a
metadata includes vital information such as image dimensions trustworthy solution for safeguarding sensitive
and sequential details,ensuring precise alignment and decoding information.
even in the presence of minor distortions. Furthermore, error-
correction codes enhance the system's capacity to withstand
V. METHODOLOGY
detection through steganalysis more difficult. The
A. Data Collection embedding process ensures that the carrier image has
The data collection process entails gathering a diverse range of sufficient capacity to store the hidden data while preserving
high-quality cover images designed to function as carriers for its original quality. Built-in error detection mechanisms
embedding concealed data. These images are meticulously chosen ensure the integrity of the embedded data by identifying
from lossless formats like BMP and PNG to preserve the integrity and addressing any inconsistencies. This method achieves
of the embedded information. The dataset is designed to include a an optimal balance between imperceptibility, security, and
wide range of images with varying attributes, such as resolutions, robustness, ensuring that the carrier image retains its
color depths, and visual content, ensuring a thorough evaluation original appearance while securely concealing the hidden
of the steganographic method's versatility and robustness. Special data. Replace the least significant bit of the carrier image’s
attention is given to ensuring that the images are free from prior pixel with a bit of the hidden data:
compression artifacts or noise, as these could affect the accuracy
of data embedding and retrieval. This collection phase is to
validate the methodology under varied real-world scenarios,
providing a robust foundation for the implementation and testing
of the LSB- based steganographic system.
Where:
B. Preprocessing
P: Original pixel value (0-255).
The Image preprocessing ensures optimal preparation of both
carrier and hidden images, facilitating seamless embedding and B: Bit of the hidden data.
retrieval. High-resolution carrier images in lossless formats,
P’: Modified pixel value
such as BMP or PNG, are chosen to maintain data integrity
throughout the process. The hidden image is resized or D. Extraction Process
reformatted to align with the carrier's embedding capacity,
ensuring compatibility while maintaining its quality. Moreover, The extraction process involves reversing the Least
metadata in binary form, which includes essential information Significant Bit (LSB) embedding procedure to retrieve the
about the hidden image such as its dimensions and sequence, is hidden data from the carrier image. The process begins with
created and attached to the hidden data. This metadata ensures the system analyzing the pixels of the carrier image to
accurate reconstruction of the hidden image during the decoding extract the binary data hidden within the least significant
phase, establishing a robust foundation for the steganography bits. The process begins by locating and extracting the
system. The preprocessing stage also verifies the integrity of metadata, which contains essential information such as the
both images to prevent embedding errors, ensuring smooth dimensions, sequence, and format of the hidden image. This
downstream processing. Advanced checks are performed to metadata is crucial for guiding the reconstruction process
verify the integrity of both images, mitigating potential errors and ensuring accuracy. After the metadata is decoded, the
during the embedding process. Techniques to manage edge system methodically extracts the binary data corresponding
cases, such as compatibility between two images, further refine to the hidden image from the carrier image. Error-
this stage. This thorough preprocessing guarantees consistency correction mechanisms, such as Hamming codes or cyclic
and dependability, forming a vital groundwork for the next redundancy checks (CRC), are applied to identify and
stages of the steganographic procedure. correct any discrepancies caused by distortions during
transmission or compression. After error correction, the
binary data is converted back into its original format,
restoring the hidden image. This step guarantees the
accurate reconstruction of the hidden data, preserving the
integrity of the steganographic system.
Metadata contains essential information such as the dimension
of the hidden image: Retrieve the least significant bit from each pixel:
M=H+W+L
Where:
H: Height of the hidden image. Use the extracted metadata for accurate reconstruction:
B: Number of bits used per Another crucial aspect of evaluation focused on the
system's embedding capacity.. High-resolution carrier
pixel. Computational Efficiency: images, particularly those in BMP and PNG formats,
demonstrated a significant ability to embed hidden data
while retaining their visual quality. For instance, a 1080p
carrier image was capable of embedding hidden data up to
25% of its size while maintaining superior visual quality.
Qualitative assessments by human observers also confirmed
that the embedded carrier images showed no visible signs
Where: of tamper.
T: Time for embedding/retrieval The results also emphasized the practical implications
R: Bits processed per second. of the system. Applications such as secure
communication, digital watermarking, and data
F. Implementation Details protection were identified as key areas where the system
The system is implemented as a user-friendly application could be deployed effectively. The ability to embed
featuring an intuitive graphical user interface (GUI) designed to sensitive information discreetly, coupled with robust
make the embedding and retrieval of hidden data accessible to retrieval mechanisms, makes the system highly relevant
both technical and non-technical users. The GUI simplifies the in today's generation.
interaction by providing straightforward options for selecting
carrier images, preparing hidden data, initiating the encoding or
decoding process. Real-time feedback is integrated into the
VII. CONCLUSION
The LSB-based steganography system designed in this of lossy compression on steganography” , 19th national
project provides a reliable, efficient, and accessible solution information systems security conference, 1996.
for securely embedding digital images. It addresses key
limitations of traditional methods by ensuring high [14] Handel, T. &Sandford, M., “ hiding data in the
imperceptibility, validated through PSNR and SSIM metrics, OSI network model” , proceedings of the 1st international
and integrating error-handling mechanisms that enhance data workshop on information hiding, June 1996.
resilience against minor distortions. The system is equipped [15] Petitcolas, F.A, P., Anderson, R.J. & Kuhn,
with a user-friendly graphical interface (GUI), ensuring M.G., “ Information hiding – a survey” , proceedings of
accessibility for both technical and non-technical users. Its the IEEE, 87:07, July 1999.
optimized computational efficiency ensures swift [16] Marvel, L.M., Boncelet Jr., C.G. & Retter, C., “
processing, even for high-resolution images, making it well- spread spectrum steganography” , IEEE transactions on
suited for real-time applications such as secure image processing, 8:08, 1999.
communication and data protection. Although the system
demonstrates excellent performance, with strong [17] P. Mahajan and A. Sachdeva, “ A Study of
imperceptibility and robust data retrieval, it exhibits Encryption Algorithms AES, DES and RSA for
limitations under extreme transformations or lossy Security,” vol. 13, no. 15, 2013.
compression. Overall, the project showcases the feasibility [18] R. Biswas, S. Bandyopadhyay, and A. Banerjee, “
of an enhanced LSB-based steganography system as a A FAST IMPLEMENTATION OF THE RSA
reliable solution for secure data embedding in diverse ALGORITHM USING,” pp. 1– 15, 2014.
application.
[19] P. Gupta and S. Kumar, “A Comparative Analysis
of SHA and MD5 Algorithm A Comparative Analysis of
SHA and MD5 Algorithm,” no. July, 2014.
REFERENCES
[20] Attacks International Symposium on Biometrics
[1] Johnson, N.F. &Jajodia, S., “ Exploring Steganography: and Security Technologies (ISBAST 2014),May 2014
Seeing the Unseen” , Computer Journal February 1998. (IEEE).
[2] . Owens, M., “ A Discussion of covert channels and [21] Muhammad Adman Aslam, Muhammed
steganography” , SANS Institute, 2002. Rashid, Farooque Azam, Muhammad Abbas, Yawrar
Rasheed, Saud S Alotaibi, Muhammed Waseem Anwar
[3] Moerland, T., “ Steganography and Steganalysis” , (2022) “ Image Steganography using Least Significant
Leiden Institute of Advanced Computing Science. Bit (LSB) - A Systematic Literature Review”, IEEE.
[4] Dunbar, B., “ Steganograpic techniques and their use in [22] H. Sajedi, & M.Jamzad, “Adaptive
an open-systems environment” , SANS Institute, January steganography method”, In Proc. Of the 9th International
2002. Conference of the signal processing, IEEE, 2008,
[5] 6. Marvel, L.M., Boncelet Jr., C.G. &Retter, C., “ pp.745- 748.
spread Spectrum steganography” , IEEE Transactionson [23] Srivastav, S., Singh, P. K., & Yadav, D. (2020).
image processing, 8:08, 1999. An approach for fast compressed text matching and to
[6] Lee, Y.K. & Chen, L.H., “ High capacity image avoid false matching using WBTC and wavelet tree. EAI
steganographic model” , visual Image signal processing, Endorsed Transactions on Scalable Information Systems,
147:03, June 2000. 8(30), e6
[7] Venkatraman, S., Abraham, A. &Paprzycki, M., “ [24] Jiawei Hu (2024) Image Steganography based
Significance of Steganography on data security” Proceedings of on improved LSB algorithm Wuhan University of
the International Conference on information technology.
[8] Johnson, N.F. & Jajodia, S., “ Steganalysis of images [25] Mohammed A. Saleh and Azizah Abdul Manaf.
created using current steganography software” , Proceedings Optimal Specifications for a Protective Framework
of the 2nd Information Hiding Workshop, April 1998. against HTTP-based DoS and DDoS