Implementing Adaptive Steganography by Exploring the Ycbcr Color Model Characteristics

Stegnography is a new way of secret communication the most widely used mechanism on account of its simplicity is the use of the least significant bit. We have used the least significant bit (2 LSB and 4 LSB) substitution method. Depending upon the characteristics of the individual portions of cover image we decide whether to use 2 LSB or 4 LSB thus it is an adaptive stegnography technique. We used one of the three channels to behave as indicator to indicate the presence of hidden data in other two channels. The module showed impressive results in terms of capacity to hide the data. In proposed method, instead of using RGB color space directly, YCbCr color space is used to make use of human visual system characteristic.




References:
[1] Abbas Cheddad,A. Joan Condell,J. Curran,K. and Kevitt,P.M., "Digital
image steganography: Survey and analysis of current methods", in the
Signal Processing Journal,vol 90 ,pp.727-752.
[2] Abu-Marie,W., Gutub,A. And Abu-Mansour, H. (2010), "Image Based
Steganography Using Truth Table Based and Determinate Array on
RGB Indicator", International Journal of Signal and Image Processing,
vol.1, no. 3, pp. 196-204.
[3] Anderson, R.J. and Petitcolas, F.A.P. (2001), "On the limits of the
Stegnography", IEEE Journal Selected Areas in Communications, vol.
16, no. 4, pp. 474-481.
[4] Avcibas, I.,Menon, N. and Sankur,B. (2003), "Steganalysis Using Image
Quality Metrics", IEEE transactions on image processing, vol. 12, no. 2,
pp.221-223.
[5] Channali, S. and Jadhav,A. (2009), "Steganography An Art of Hiding
Data" , International Journal on Computer Science and Engineering,
vol.1, no. 3, pp. 137-141.
[6] Fridrich, J.,Goljan, M. and Du, R.(2001), "Detecting LSB
Steganography in Color and Grayscale Images", Magazine of IEEE
Multimedia Special Issue on Security, vol. 15, no. 1, pp. 22-28.
[7] Gutub, A., Ankeer, M., Ghalioun, M.A., Shaheen, A. and Alvi, A.
(2008), "Pixel indicator high capacity technique for RGB image based
[8] Steganography", WoSPA 5th IEEE International Workshop on Signal
Processing and its Applications, U.A.E, pp.234-239.
[9] Naoe,K. and Takefuji,F.(2004), "Damageless Information Hiding using
Neural Network on YCbCr Domain", IJCSNS International Journal of
Computer Science and Network Security, vol.8 ,no.9,pp.81-84.
[10] Neil, F.J. and Jajodia, S. (1998), "Exploring steganography: Seeing the
unseen", IEEE Transaction on computer practices, Washington, vol. 31,
no. 2, pp.26-34.
[11] Rattanapitak, W. and Udomhunsakul,S., "Comparative Efficiency of
Color Models for Multi-focus Color Image Fusion", Proceddings of the
intenational multiconference of engineers and computer scientists,Hong
Kong,vol II.
[12] Sallee,P.(2003), " Model-based steganography" , in Proceedings of the
2nd International Workshop on Digital Watermarking, Seoul, Korea,
LNCS, vol. 2939, pp. 254-260.