KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Sciences (IJCES) – Volume-1 Issue -2
1
ISSN: - 2394-6180(online) www.knowledgecuddle.com
A Survey of Image Based Steganography
Vikshit Rabara, Aditya Goswami
Information Technology Department
Gujarat Technological University,
Gujarat, INDIA
ABSTRACT: Steganography is going to gain its importance due to the exponential growth and secret communication of
potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually
deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in
communication, image, text, voice or multimedia content for copyright, military communication, authentication and many
other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used
as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden
message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered
steganography overview its major types, classification, applications [3].
KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB
I. INTRODUCTION
Steganography is a technique to transfer information over the public communication channel in such a way that an attacker
cannot identify the transmission of secret information on the background of a public communication [1]. Taking the cover
object as image in steganography is known as image steganography. Coding secret message in digital image is by far the most
widely used of all methods in the digital world of today. Main advantage of this method is that limited power of the human
visual system. There are two basic methods implemented in steganography. Least significant bit (LSB) spatial domain based
technique and transform-based frequency Domain technique [6].
II. IMAGE BASED STEGANOGRAPHY TECHNIQUE
Image steganography, the covert embedding of data into digital pictures, represents a threat to the protecting of sensitive
information and the gathering of intelligence [8]. An image steganographic scheme is one kind of steganographic systems,
where the secret message is hidden in a digital image with some hiding method. Someone can then use a proper embedding
procedure to recover the hidden message from the image. The original image is called a cover image in steganography, and the
message-embedded image is called a stego image [9]. Following figure shows the concept diagram of image based
steganography.
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Sciences (IJCES) – Volume-1 Issue -2
2
ISSN: - 2394-6180(online) www.knowledgecuddle.com
IMAGE
A. BASED STEGANOGRAPHY
Such techniques like LSB, random pixel embedding, pixel value differencing, Discrete Cosine transformation (DCT),
distortion, masking and filtering etc. From these, widely used techniques are LSB-Least Significant Method and DCT-Discrete
Cosine Transformation. Reason behind this is that, it is easy to implement and hard to detect. Detail view on these two
methods is given below [10].
B. LSB TECHNIQUE
The LSB (Least Significant Bit) based steganography is combined with Genetic Algorithm to enhance security level of the
image. Genetic Algorithm modifies the pixel locations of the stego image and hence the hidden data could not be recovered
easily. The images are represented with numerical values of each pixel where the value represents the colour and intensity of
the pixel [10]. Images are mainly of two types: 8-bit images, 24-bit images
 8-bit images: In 8-bit images maximum numbers of colours that can be present are only 256 colours [1].
 24-bit images: Each pixel in these images has 24 bit value in which each 8 bit value refers to three colours red, blue
and green [1].
In this method we change the LSB of pixel with the binary code of secret message and then hide it in the original image.
For this operation we use one or two bits as LSB and interchange it with message’s bit.
Algorithm: Least Significant Bit Hiding Algorithm [8].
Inputs: RGB image, secret message and the password.
Output: Stego image.
Begin
Scan the image row by row and encode it in binary.
Encode the secret message in binary.
Check the size of the image and the size of the secret message.
Start sub-iteration 1:
Choose one pixel of the image randomly
Divide the image into three parts (Red, Green and Blue parts)
Hide two by two bits of the secret message in each part of the pixel in the two LSB
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Sciences (IJCES) – Volume-1 Issue -2
3
ISSN: - 2394-6180(online) www.knowledgecuddle.com
Set the image with the new values.
End sub-iteration 1.
Set the image with the new values and save it.
End
Following figure shows the Least Significant Bit Hiding Technique. In which, we hide the two LSB of the any pixel and
replace it by the bit of secret message [10].
In nowadays, 24- bit image is more used in the LSB technique because it uses RGB (red, green, blue) colour scheme
to hide the data and it has more than 16 million colour combination while in 8-bit image, we use gray scheme to secure the
data. As mentioned above that it has only 256 colour combination, so it is less robust and less secure than the 24-bit image.
C. Advantages of LSB method
It is easiest method in between all the steganographic methods. . A large majority of freely available steganography
software makes use of LSB replacement, but there is a more important reason: it can be performed without any special tools at
all [2]. We can consider it as worthy of study because of its widespread use.
D. Disadvantages of LSB method
These methods are based on false assumption that LSB plane of natural images is random enough, thus are suitable
for data hiding [3]. Such assumption is not always true, especially for images with more smooth regions.
III. DCT TECHNIQUE
DCT based technique insertion of secret information in carrier depends on the DCT coefficients [7]. Any DCT coefficient
value above proper threshold is a potential place for insertion of secret information. LSBs of these potential locations in carrier
image are replaced with MSBs of the secret image [4].
Embedding Process [5]
Step 1: Select Carrier Image from the set.
Step 2: Find DCT coefficients of Carrier Image.
Step 3: Traverse through each pixel in Carrier Image till end of Secret Image.
Step 3.1: If DCT coefficient value is below threshold then replace LSB(s) with MSB(s) of pixels in Secret
Image.
Step 3.2: Insert 1 at that location in the key matrix.
Step 4: Evaluate the Stego Image
KNOWLEDGECUDDLE PUBLICATION
International Journal of Computer Engineering and Sciences (IJCES) – Volume-1 Issue -2
4
ISSN: - 2394-6180(online) www.knowledgecuddle.com
IV. CONCLUSION
This paper gave an overview of different steganographic techniques its major types and classification of steganography
which have been proposed in the literature during last few years. We have critical analyzed different proposed techniques
which show that visual quality of the image is degraded when hidden data increased up to certain limit using LSB based
methods. And many of them embedding techniques can be broken or shows indication of alteration of image by careful
analysis of the statistical properties of noise or perceptually analysis.
REFERENCES
[1]. N. Provos and P. Honeyman, Hide and Seek: An Introduction to Steganography, IEEE Security and Privacy, Mar
2003, 32-44.
[2]. Neil F. Johnson and Sushil Jajodia, Exploring Steganography: Seeing the Unseen, IEEE computer, Feb 1998, 26-34
[3]. G. C. Kesseler, Steganography: Hiding Data within Data, an edited version of this paper with the title Hiding Data in
Data, originally appeared in the April 2002 issue of Windows & .NET magazine. Sep 2001.
[4]. S. Channalli and A. Jadhav, “Steganography an Art of Hiding Data”, International Journal on Computer Science and
Engineering, IJCSE, vol. 1, no. 3, (2009).
[5]. C.-H. Yang, C.-Y. Weng, S.-J. Wang, Member, IEEE and H.-M. Sun, “Adaptive Data Hiding in Edge Areas of
Images with Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, vol. 3, no.
(2008) September 3, pp. 488-497.
[6]. K.-H. Jung, K.-J. Ha and K.-Y. Yoo, “Image data hiding method based on multi-pixel differencing and LSB
substitution methods”, Proc. 2008 International Conference on Convergence and Hybrid Information Technology
(ICHIT '08), Daejeon (Korea), (2008) August 28-30, pp. 355-358.
[7]. J. Rodrigues, J. Rios, and W. Puech “SSB-4 System of Steganography using bit 4”, In International Workshop on
Image Analysis for Multimedia WIAMIS, May, 2005.
[8]. J. Fridrich, and M. Goljan, “Practical steganalysis: state-ofthe-art”, In Proceeding of SPIE Photonics West, Electronic
Imaging 2002, volume 4675, pp. 1-13, 2002.
[9]. Tu C. and Tran T D. “Context based entropy coding of block transform coefficients for image compression”, IEEE
Transaction on Image Processing, Vol.11, No.11, November, 2002.
[10]. Wenqiong Yu, “Blind Detection for JPEG Steganography”, International Conference on Networking and Information
Technology , pp. 128-132, July 2010.

More Related Content

PDF
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
PDF
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
PDF
G0210032039
PDF
Improved LSB Steganograhy Technique for grayscale and RGB images
PDF
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
PDF
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
PDF
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
PDF
J017426467
A NOVEL IMAGE STEGANOGRAPHY APPROACH USING MULTI-LAYERS DCT FEATURES BASED ON...
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
G0210032039
Improved LSB Steganograhy Technique for grayscale and RGB images
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
High Security Cryptographic Technique Using Steganography and Chaotic Image E...
Genetic Algorithm based Mosaic Image Steganography for Enhanced Security
J017426467

What's hot (18)

PDF
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
PDF
O017429398
PDF
A Review of Comparison Techniques of Image Steganography
PDF
A new image steganography algorithm based
PDF
www.ijerd.com
PDF
Color image steganography in YCbCr space
PDF
Image Steganography Techniques
PDF
Implementation of image steganography using lab view
PDF
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
PPT
Image Steganography Using M16 Method
PDF
M017427985
PDF
A Secure Color Image Steganography in Transform Domain
PDF
Image steganography using least significant bit and secret map techniques
PPTX
Image steganography
PDF
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
PDF
A robust combination of dwt and chaotic function for image watermarking
PPTX
A secured-rgb-image-steganography-using-secret-key
PDF
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
O017429398
A Review of Comparison Techniques of Image Steganography
A new image steganography algorithm based
www.ijerd.com
Color image steganography in YCbCr space
Image Steganography Techniques
Implementation of image steganography using lab view
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
Image Steganography Using M16 Method
M017427985
A Secure Color Image Steganography in Transform Domain
Image steganography using least significant bit and secret map techniques
Image steganography
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
A robust combination of dwt and chaotic function for image watermarking
A secured-rgb-image-steganography-using-secret-key
Design and Implementation of Lifting Based Wavelet and Adaptive LSB Steganogr...
Ad

Viewers also liked (13)

PDF
นิทรรศการพระสิทธิธาดา
PDF
Sponsorship Report | Sept 2014
PPTX
Social media_lindsey
PDF
Sales_manager_resume[1]
DOC
CURRICULUM VITAE- sonal
PDF
Richard Smith
ODP
Question 1
PPTX
Formas y animaciones
PPTX
Priamry data type
DOCX
Ke ipsos spec_poll_narrative_report _6th_may_2015
PPTX
Formas y animaciones leidy
PDF
Matt Schultz 4.4
PPTX
Управление химическим производством
นิทรรศการพระสิทธิธาดา
Sponsorship Report | Sept 2014
Social media_lindsey
Sales_manager_resume[1]
CURRICULUM VITAE- sonal
Richard Smith
Question 1
Formas y animaciones
Priamry data type
Ke ipsos spec_poll_narrative_report _6th_may_2015
Formas y animaciones leidy
Matt Schultz 4.4
Управление химическим производством
Ad

Similar to A Survey of Image Based Steganography (20)

PDF
Image steganography techniques
PDF
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
PDF
www.ijerd.com
PDF
Comparative Study of Spatial Domain Image Steganography Techniques
PDF
A Survey Paper On Different Steganography Technique
PDF
A Survey of different Data Hiding Techniques in Digital Images
PDF
Image Steganography Project Report
PDF
A novel hash based least significant bit (2 3-3) image steganography in spati...
PDF
Security and imperceptibility improving of image steganography using pixel al...
PDF
Ijetcas14 335
PDF
International Journal of Computational Engineering Research(IJCER)
PDF
Text in Image Hiding using Developed LSB and Random Method
PDF
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
PDF
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
PDF
Fx3610771081
PDF
An LSB Method Of Image Steganographic Techniques
PDF
G017444651
PDF
Image Steganography using MATLAB
PDF
Improving wpt color_image_decomposition
PDF
Improving wpt color_image_decomposition
Image steganography techniques
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
www.ijerd.com
Comparative Study of Spatial Domain Image Steganography Techniques
A Survey Paper On Different Steganography Technique
A Survey of different Data Hiding Techniques in Digital Images
Image Steganography Project Report
A novel hash based least significant bit (2 3-3) image steganography in spati...
Security and imperceptibility improving of image steganography using pixel al...
Ijetcas14 335
International Journal of Computational Engineering Research(IJCER)
Text in Image Hiding using Developed LSB and Random Method
Journal - DATA HIDING SECURITY USING BIT MATCHING-BASED STEGANOGRAPHY AND CR...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping ...
Fx3610771081
An LSB Method Of Image Steganographic Techniques
G017444651
Image Steganography using MATLAB
Improving wpt color_image_decomposition
Improving wpt color_image_decomposition

Recently uploaded (20)

PPTX
CS6006 - CLOUD COMPUTING - Module - 1.pptx
PPTX
MAD Unit - 3 User Interface and Data Management (Diploma IT)
PDF
Beginners-Guide-to-Artificial-Intelligence.pdf
PDF
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
PPTX
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
PDF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
chapter 1.pptx dotnet technology introduction
PPTX
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
PDF
Software defined netwoks is useful to learn NFV and virtual Lans
PDF
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
DOCX
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
PDF
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
PDF
Lesson 3 .pdf
PDF
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
PPTX
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
PDF
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
PPTX
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
PPTX
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
PPTX
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa
CS6006 - CLOUD COMPUTING - Module - 1.pptx
MAD Unit - 3 User Interface and Data Management (Diploma IT)
Beginners-Guide-to-Artificial-Intelligence.pdf
LS-6-Digital-Literacy (1) K12 CURRICULUM .pdf
Real Estate Management PART 1.pptxFFFFFFFFFFFFF
MACCAFERRY GUIA GAVIONES TERRAPLENES EN ESPAÑOL
Cryptography and Network Security-Module-I.pdf
chapter 1.pptx dotnet technology introduction
WN UNIT-II CH4_MKaruna_BapatlaEngineeringCollege.pptx
Software defined netwoks is useful to learn NFV and virtual Lans
AIGA 012_04 Cleaning of equipment for oxygen service_reformat Jan 12.pdf
ENVIRONMENTAL PROTECTION AND MANAGEMENT (18CVL756)
Engineering Solutions for Ethical Dilemmas in Healthcare (www.kiu.ac.ug)
Lesson 3 .pdf
VSL-Strand-Post-tensioning-Systems-Technical-Catalogue_2019-01.pdf
INTERNET OF THINGS - EMBEDDED SYSTEMS AND INTERNET OF THINGS
CELDAS DE COMBUSTIBLE TIPO MEMBRANA DE INTERCAMBIO PROTÓNICO.pdf
BBOC407 BIOLOGY FOR ENGINEERS (CS) - MODULE 1 PART 1.pptx
ARCHITECTURE AND PROGRAMMING OF EMBEDDED SYSTEMS
SE unit 1.pptx by d.y.p.akurdi aaaaaaaaaaaa

A Survey of Image Based Steganography

  • 1. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Sciences (IJCES) – Volume-1 Issue -2 1 ISSN: - 2394-6180(online) www.knowledgecuddle.com A Survey of Image Based Steganography Vikshit Rabara, Aditya Goswami Information Technology Department Gujarat Technological University, Gujarat, INDIA ABSTRACT: Steganography is going to gain its importance due to the exponential growth and secret communication of potential computer users over the internet [5]. It can also be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. Generally data embedding is achieved in communication, image, text, voice or multimedia content for copyright, military communication, authentication and many other purposes [2]. In image Steganography, secret communication is achieved to embed a message into cover image (used as the carrier to embed message into) and generate a stego- image (generated image which is carrying a hidden message)[1]. In this paper we have critically analyzed various steganographic techniques and also have covered steganography overview its major types, classification, applications [3]. KEYWORDS: STEGANOGRAPHY, STEGO IMAGE, COVER IMAGE, LSB I. INTRODUCTION Steganography is a technique to transfer information over the public communication channel in such a way that an attacker cannot identify the transmission of secret information on the background of a public communication [1]. Taking the cover object as image in steganography is known as image steganography. Coding secret message in digital image is by far the most widely used of all methods in the digital world of today. Main advantage of this method is that limited power of the human visual system. There are two basic methods implemented in steganography. Least significant bit (LSB) spatial domain based technique and transform-based frequency Domain technique [6]. II. IMAGE BASED STEGANOGRAPHY TECHNIQUE Image steganography, the covert embedding of data into digital pictures, represents a threat to the protecting of sensitive information and the gathering of intelligence [8]. An image steganographic scheme is one kind of steganographic systems, where the secret message is hidden in a digital image with some hiding method. Someone can then use a proper embedding procedure to recover the hidden message from the image. The original image is called a cover image in steganography, and the message-embedded image is called a stego image [9]. Following figure shows the concept diagram of image based steganography.
  • 2. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Sciences (IJCES) – Volume-1 Issue -2 2 ISSN: - 2394-6180(online) www.knowledgecuddle.com IMAGE A. BASED STEGANOGRAPHY Such techniques like LSB, random pixel embedding, pixel value differencing, Discrete Cosine transformation (DCT), distortion, masking and filtering etc. From these, widely used techniques are LSB-Least Significant Method and DCT-Discrete Cosine Transformation. Reason behind this is that, it is easy to implement and hard to detect. Detail view on these two methods is given below [10]. B. LSB TECHNIQUE The LSB (Least Significant Bit) based steganography is combined with Genetic Algorithm to enhance security level of the image. Genetic Algorithm modifies the pixel locations of the stego image and hence the hidden data could not be recovered easily. The images are represented with numerical values of each pixel where the value represents the colour and intensity of the pixel [10]. Images are mainly of two types: 8-bit images, 24-bit images  8-bit images: In 8-bit images maximum numbers of colours that can be present are only 256 colours [1].  24-bit images: Each pixel in these images has 24 bit value in which each 8 bit value refers to three colours red, blue and green [1]. In this method we change the LSB of pixel with the binary code of secret message and then hide it in the original image. For this operation we use one or two bits as LSB and interchange it with message’s bit. Algorithm: Least Significant Bit Hiding Algorithm [8]. Inputs: RGB image, secret message and the password. Output: Stego image. Begin Scan the image row by row and encode it in binary. Encode the secret message in binary. Check the size of the image and the size of the secret message. Start sub-iteration 1: Choose one pixel of the image randomly Divide the image into three parts (Red, Green and Blue parts) Hide two by two bits of the secret message in each part of the pixel in the two LSB
  • 3. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Sciences (IJCES) – Volume-1 Issue -2 3 ISSN: - 2394-6180(online) www.knowledgecuddle.com Set the image with the new values. End sub-iteration 1. Set the image with the new values and save it. End Following figure shows the Least Significant Bit Hiding Technique. In which, we hide the two LSB of the any pixel and replace it by the bit of secret message [10]. In nowadays, 24- bit image is more used in the LSB technique because it uses RGB (red, green, blue) colour scheme to hide the data and it has more than 16 million colour combination while in 8-bit image, we use gray scheme to secure the data. As mentioned above that it has only 256 colour combination, so it is less robust and less secure than the 24-bit image. C. Advantages of LSB method It is easiest method in between all the steganographic methods. . A large majority of freely available steganography software makes use of LSB replacement, but there is a more important reason: it can be performed without any special tools at all [2]. We can consider it as worthy of study because of its widespread use. D. Disadvantages of LSB method These methods are based on false assumption that LSB plane of natural images is random enough, thus are suitable for data hiding [3]. Such assumption is not always true, especially for images with more smooth regions. III. DCT TECHNIQUE DCT based technique insertion of secret information in carrier depends on the DCT coefficients [7]. Any DCT coefficient value above proper threshold is a potential place for insertion of secret information. LSBs of these potential locations in carrier image are replaced with MSBs of the secret image [4]. Embedding Process [5] Step 1: Select Carrier Image from the set. Step 2: Find DCT coefficients of Carrier Image. Step 3: Traverse through each pixel in Carrier Image till end of Secret Image. Step 3.1: If DCT coefficient value is below threshold then replace LSB(s) with MSB(s) of pixels in Secret Image. Step 3.2: Insert 1 at that location in the key matrix. Step 4: Evaluate the Stego Image
  • 4. KNOWLEDGECUDDLE PUBLICATION International Journal of Computer Engineering and Sciences (IJCES) – Volume-1 Issue -2 4 ISSN: - 2394-6180(online) www.knowledgecuddle.com IV. CONCLUSION This paper gave an overview of different steganographic techniques its major types and classification of steganography which have been proposed in the literature during last few years. We have critical analyzed different proposed techniques which show that visual quality of the image is degraded when hidden data increased up to certain limit using LSB based methods. And many of them embedding techniques can be broken or shows indication of alteration of image by careful analysis of the statistical properties of noise or perceptually analysis. REFERENCES [1]. N. Provos and P. Honeyman, Hide and Seek: An Introduction to Steganography, IEEE Security and Privacy, Mar 2003, 32-44. [2]. Neil F. Johnson and Sushil Jajodia, Exploring Steganography: Seeing the Unseen, IEEE computer, Feb 1998, 26-34 [3]. G. C. Kesseler, Steganography: Hiding Data within Data, an edited version of this paper with the title Hiding Data in Data, originally appeared in the April 2002 issue of Windows & .NET magazine. Sep 2001. [4]. S. Channalli and A. Jadhav, “Steganography an Art of Hiding Data”, International Journal on Computer Science and Engineering, IJCSE, vol. 1, no. 3, (2009). [5]. C.-H. Yang, C.-Y. Weng, S.-J. Wang, Member, IEEE and H.-M. Sun, “Adaptive Data Hiding in Edge Areas of Images with Spatial LSB Domain Systems”, IEEE Transactions on Information Forensics and Security, vol. 3, no. (2008) September 3, pp. 488-497. [6]. K.-H. Jung, K.-J. Ha and K.-Y. Yoo, “Image data hiding method based on multi-pixel differencing and LSB substitution methods”, Proc. 2008 International Conference on Convergence and Hybrid Information Technology (ICHIT '08), Daejeon (Korea), (2008) August 28-30, pp. 355-358. [7]. J. Rodrigues, J. Rios, and W. Puech “SSB-4 System of Steganography using bit 4”, In International Workshop on Image Analysis for Multimedia WIAMIS, May, 2005. [8]. J. Fridrich, and M. Goljan, “Practical steganalysis: state-ofthe-art”, In Proceeding of SPIE Photonics West, Electronic Imaging 2002, volume 4675, pp. 1-13, 2002. [9]. Tu C. and Tran T D. “Context based entropy coding of block transform coefficients for image compression”, IEEE Transaction on Image Processing, Vol.11, No.11, November, 2002. [10]. Wenqiong Yu, “Blind Detection for JPEG Steganography”, International Conference on Networking and Information Technology , pp. 128-132, July 2010.