vii TABLE OF CONTENT CHAPTER 1 TITLE PAGE DECLARATION ii DEDICATION iii ACKNOWLEDGMENT iv ABSTRACT v ABSTRAK vi TABLE OF CONTENTS vii LIST OF TABLES xi LIST OF FIGURES xiii LIST OF ABBREVIATIONS xvi INTRODUCTION 1.1 Introduction 1 1.2 Background of the Problem 3 1.2.1 Low Payload Capacity 3 1.2.2 Imperceptibility problems 4 1.2.3 Robustness Problem 4 1.3 Statement of the Problem 5 1.4 Research Aim 6 1.5 Objectives of Research 6 1.6 Research Scope 7 1.7 Significance of the Research 11 viii 2 LITERATURE REVIEW 2.1 Introduction 9 2.2 Historical Overview 10 2.3 Cryptography 11 2.4 Cryptography Vs Steganography 12 2.5 Combination of Crypto-Steganography 13 2.6 Steganography protocols 14 2.7 Digital Watermarking 15 2.7.1 2.8 Steganography and Digital Watermarking 16 Types of steganography 2.8.1 Text Steganography 18 2.8.2 Image Steganography 19 2.8.3 Audio Steganography 20 2.8.4 Video Steganography 20 2.8.5 Protocol Steganography 21 2.9 Steganography terminology 21 2.10 Steganography properties 22 2.10.1 Imperceptibility 22 2.10.2 Robustness 23 2.10.3 Payload Capacity 24 2.11 Techniques of Steganography 24 2.11.1 Least Significant Bit (LSB) 26 2.11.2 LSB and Palette Based Images 28 2.11.3 Enhanced LSB Algorithms 29 2.11.3.1 SLSB Algorithm 29 2.11.3.2 The PVD Method 31 2.11.3.3 Applying randomization concepts to LSB 2.12 PSNR formula 31 35 2.13 Attacks on Steganography 36 2.14 Visual Attacks 37 ix 2.14.1 2.14.2 3 4 38 Chi-square Attack 38 RESEARCH METHODOLOGY 3.1 Introduction 43 3.2 Dataset 44 3.3 Methodology 45 3.4 Data preparation 46 3.4.1 Cover Image Fibonacci Representation 47 3.4.2 Statistical Properties for Cover Image 49 3.4.3 Zeckendorf’s theorem 53 3.4.4 Pixels Decomposition using Fibonacci 54 3.4.5 Secret message preparation 57 3.5 Embedding Process 65 3.6 Imperceptibility Evaluation 69 3.7 Chi-square (χ2) Attack Implementation 69 3.8 Extraction Process 71 RESULTS AND DISCUSSION 4.1 Introduction 73 4.2 Implementation Results 74 4.2.1 Imperceptibility 74 4.2.1.1 75 4.3 5 Statistical analysis of pairs of values (histogram analysis) PSNR Results 4.2.2 Visual Attack 81 4.2.3 Robustness Evaluation 85 Summary 88 CONCLOSIONS 5.1 Introduction 89 5.2 Work summary 90 5.3 Research Contribution 90 5.4 Future Works 91 x REFERENCES 93 xi LIST OF TABLES TABLE NO. TITLE PAGE 2.1 Comparison between Steganography and Cryptography 12 2.2 Comparison between steganography and digital watermarking. 17 2.3 LSB Insertion for Colored Image Pixel 30 2.4 The values of colored image pixel in SLSB Insertion method 30 Summary of Steganography techniques applied by different authors. 33 The values of Binary and Fibonacci system for some of n values 40 The maximum number of changing in pixel value after embedding 40 3.1 Impact of each Fibonacci bitplane into whole image 47 3.2 Impact of each Binary bitplane into the whole image 48 3.3 Comparisons between 0’s and 1’s pixels value in bitplane (1) for binary representation 49 Fibonacci decomposition comparisons between 0’s and 1’s pixels value in bitplane (1) 50 Binary decomposition comparisons between 0’s and 1’s pixels value in bitplane (2) 51 Fibonacci decomposition comparisons between 0’s and 1’s pixels value in bitplane (2) 52 The decimal and binary representation for lower case letter and whitespace 56 modified decimal and binary representation for lower case letters 60 2.5 2.6 2.7 3.4 3.5 3.6 3.7 3.8 xii 4.1 4.2 4.3 4.4 4.5 4.6 The The The The PSNR of Lena 512x512 pixel cover image after embedding variable size payloads 76 The PSNR of Peppers 512x512 pixel cover image after embedding variable size payloads 76 The PSNR of Camerman 512x512 pixel cover image after embedding variable size payloads 77 PSNR of Baboon 512x512 pixel cover image after embedding variable size payloads 77 PSNR of Lake 512x512 pixel cover image after embedding variable size payloads 78 PSNR of Pirate 512x512 pixel cover image after embedding variable size payloads 78 xiii LIST OF FIGURES FIGURE NO. TITLE PAGE 2.1 Cryptography steganography combination 13 2.2 Steganography category 18 2.3 General steganography system 22 2.4 Categories of image Steganography 25 2.5 Model of steganography and steganalysis 37 2.6 Shows the Binary Representation for 256 Grayscale image 41 Shows the Fibonacci Representation for 256 ] Grayscale image 41 Grayscale images, (a) Peppers, (b) Baboon, (c) Lena, (d) Cameraman, (e) Lake, (f) Pirate 44 3.2 Operational Framework 45 3.3 Lena image with Fibonacci decomposition (12-Bitplane) 47 Lena image with Binary decomposition (8-Bitplane) 48 The probability of changing and not changing due to embedding process into bitplane(1) 58 The probability of changing and not changing due to embedding process into bitplane(2) 59 The probability of changing and not changing due to embedding process into bitplane(1) 62 2.7 3.1 3.4 3.5 3.6 3.7 xiv FIGURE NO. 3.8 TITLE The probability of changing and not changing due to embedding process into bitplane(2) PAGE 63 3.9 Chosen of pixels (P1,P2,…,P8) to hide secret inside it 65 3.10 Fibonacci LSB Embedding process 66 4.1 Grayscale images, (a) Peppers, (b) Baboon, (c) Lena,(d) Cameraman, (e) Lake, (f) Pirate 75 PSNR(db) Vs Payload(Bytes) for simple LSB, Fibonacci and the proposed method 79 Imperceptibility after embedding of (65536 bytes) using (a) Original imag (b) Simple LSB (c) Fibonacci LSB (d)Proposed method. 80 Representation of Layer(1) for all of ( (a) original, (b) binary embedding stego-image, (c) Fibonacci LSB stego-image and (d) proposed method stego-image) for Lena Stego-image with embedding of 65536 bytes embedding variable size payloads 81 Representation of Layer(2) for all of ( (a) original, (b) binary embedding embedding sego-image, (c) Fibonacci LSB stego-image and (d) proposed method stego -image) for Lena Stego-image with embedding of 65536 bytes 82 Representation of Layer(3) for all of ( (a) original, (b) binary embedding sego-image, (c) Fibonacci LSB stego-image and (d) proposed method stego-image) for Lena Stego-image with embedding of 65536 bytes. 83 4.7 Chi-square attack on original Lena image. 84 4.8 Chi-square attack on lena stego-image after imbedding of 16384 bytes by using of simple LSB method. 85 Chi-square attack on lena stego-image after imbedding of 16384 bytes by using of Fibonacci LSB method. 86 4.2 4.3 4.4 4.5 4.6 4.9 4.10 Chi-square attack on lena stego-image after xv FIGURE NO. TITLE embedding of 16384 bytes using of proposed method PAGE 86 xvi LIST OF ABBREVATIONS LSB Least significant Bit HVS Human Visual System PVD Pixel Value Differencing method MBNS Multiple-Base Notational System DCT Discrete Cosine Transform XML Extensible Markup Language JPEG Joint Photographic Expert Group GIF Graphic Interchange Format Bmp Bitmap image format OSI Open Systems Interconnection TCP/IP Internet protocol suite TCP/IP HAD Human Audio System PSNR peak signal to noise ratio MSE Mean Square Error SLSB Selected Least Significant Bit PVD Pixel-Value Differencing PRNG Pseudo-Random Number Generator RGB Red Green Blue