The new steganography technique is based on the dividing the image into number of layers. According to this technique the host image is divided into number of blocks and the secret data is inserted in to the image by the binary representation of pixel values. The system performs the scan of rows and columns of each pixel by pixel finding most similar column location and differences from secret bit message location and the data will be modified by minimal number of LSB blocks. In different experiments the messages are embed into theimage. The stegnalaysis is evaluated through distorted pixels representation.
Approaches in Steganography:
Substitution Technique.
2. Transform Domain Technique.
3. Spread Spectrum Technique.
4. Statistical Techniques.
5. Distortion Techniques.
6. Cover Generation Technique.
7. LSB: Changing the least significant bit of each image, to match that of the message being steganised.
8. Pseudo random (Patchwork)
The steganography is a process of hiding the important messages in the form invisible or covered form. Steganography was invented to hide secret message in olden days by messengers for communication between the Kingdoms. They used some fruit juice for writing messages and they are visible only under fire. Some of them used wax covering on letters engraved on wood. But in this new generation to avoid the piracy of digital media and for sending important messages the process is being used. The approaches defined above are some of the steganography techniques.
The images are hidden in other images by hiding the adjacent pixels. Due to increasing in piracy the steganography is most widely used in many fields. Depending on the steganography technique used the digital media is that much safer only the decrypting known person can only decrypt the original image normal humans cannot find the original image unless they know the technique.
Download Main approaches of Steganography Thesis for CSE Final Year Students.