Select Currency
Translate this page

AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION

Format: MS WORD  |  Chapter: 1-5  |  Pages: 80  |  910 Users found this project useful  |  Price NGN5,000

  DOWNLOAD THE COMPLETE PROJECT

AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION

 

ABSTRACT

Image steganography is the science of hiding data for securing confidential communication and it is the most popular type of carrier to hold information. Many algorithms have been proposed to hide information into digital images. The least significant bit algorithm (LSB) as one of the algorithms proposed is widely used in message embedding. However, the robustness of the algorithm based on LSB is low. The hidden message is usually destroyed when some image operations like resizing, cropping and rotation are applied to the stego-image. To overcome this limitation, this work proposed an improved image steganography based on least significant bit matching revisited (LSBMR) using Sobel edge detection that withstands image operations like resizing, rotation and cropping. The proposed method employs 2-dimensional discrete cosine transformation (2D-DCT) to transform the detected edges of the cover image pixel value into its coefficient, embeds the secret message in the coefficients of the detected edges of the cover image which was implemented in Netbeans IDE. Experimental results produced better stego-image quality that is robust against multiple image operations such as resizing and cropping. The statistical steganalysis tools such as Virtual Steganographic Laboratory (VSL) and StegExpose cannot detect the presence of secret information in the stego-image. Also, the proposed system generated stego-image with Peak Signal to Noise Ratio (PSNR) that is an image quality metric of 68 decibels (dB) for 8000 bits of secret message as regards to the invisibility over the existing steganography technique.

 

CHAPTER ONE

INTRODUCTION

This chapter discusses the introductory part of this dissertation, which includes the background to the study, problem statements and research motivation, the research aim and objectives, research methodology, contribution to knowledge and finally the organization of the rest of the dissertation.

1.1 Background to the Study

Recently, people exchange information using the existing communication technologies such as the internet and huge volume of data transfer takes place via the plethora of services offered by the web. This information can be very sensitive and need to be protected against any attacker who tries to intercept them during the transmission stage. According to Ratnakirti et al., (2013), data over internet may be stolen, intercepted, illegally modified or even destroyed by an adversary resulting in intellectual property rights infringement, data loss, data leakage and data damage.

Transmitting top secret information cannot be solely relied on the existing communication channels because the technologies are vulnerable to attacks Osama, (2005) and exchanged information can be detected relatively easily. Therefore, it is vital to protect the privacy and confidentiality of top secret message during its transit through the internet. To preserve the privacy and confidentiality of important data over the internet it must be provided with a metaphorical envelope such that its contents are revealed only to the intended receiver Ratnakirti et al., (2013) without arousing suspicions.

Data hiding techniques such as steganography precisely aim at performing this task.The steganography technique has been used many years ago to convey secret messages. For instance, Greek historian Herodotus was the first to document the usage of steganography to send messages (Aubrey, 1996). A slave was sent by his master to deliver a secret message tattooed on his scalp. After the message was tattooed, the slave waited until his hair grew back and concealed the message. The most popular steganographic methods between the 13th and 16th century involved written text. One method used a mask, a paper with holes, shared between the sender and recipient. The mask was simply put over the text and the message was revealed. Francis Bacon realized that two different fonts for each letter can be applied to embed binary representations of messages. Holub, (2014), stated that ―Brewster devised a very original technique in 1857, which was later used in several wars‖.

  DOWNLOAD THE COMPLETE PROJECT

AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION

Not The Topic You Are Looking For?



For Quick Help Chat with Us Now!

+234 813 292 6373

+233 55 397 8005


HOW TO GET THE COMPLETE PROJECT ON AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION INSTANTLY

  • Click on the Download Button above.
  • Select any option to get the complete project immediately.
  • Chat with Our Instant Help Desk on +234 813 292 6373 for further assistance.
  • All projects on our website are well researched by professionals with high level of professionalism.

Here's what our amazing customers are saying

Temitayo Ayodele
Obafemi Awolowo University
My friend told me about iprojectmaster website, I doubted her until I saw her download her full project instantly, I tried mine too and got it instantly, right now, am telling everyone in my school about iprojectmaster.com, no one has to suffer any more writing their project. Thank you for making life easy for me and my fellow students... Keep up the good work
Very Good
Musa From Ahmadu Bello University
Thank you iprojectmaster for saving my life, please keep it up and may God continue to bless you people.
Excellent
Oluchi From Michael Opara University
If you are a student and you have not used iprojectmaster materials, you are missing big time! iprojectmaster is the BEST
Excellent
MATTHEW NGBEDE
Ahmadu Bello University
I wish I knew you guys when I wrote my first degree project, it took so much time and effort then. Now, with just a click of a button, I got my complete project in less than 15 minutes. You guys are too amazing!
Excellent
Adam Alhassan Yakubu
UDS
Excellent work and delivery , I promise to share my testimonies everyone in need of this kind of work. You're the best
Excellent
Ibrahim Muhammad Muhammad
Usmanu danfodiyo university, sokoto
It's a site that give researcher student's to gain access work,easier,affordable and understandable. I appreciate the iproject master teams for making my project work fast and available .I will surely,recommend this site to my friends.thanks a lot..!
Excellent
Dau Mohammed Kabiru
Kaduna State College of Education Gidan Waya
This is my first time..Your service is superb. But because I was pressed for time, I became jittery when I did not receive feedbackd. I will do more business with you and I will recommend you to my friends. Thank you.
Very Good
Joseph M. Yohanna
Thanks a lot, am really grateful and will surely tell my friends about your website.
Excellent
Peace From Unilag
I cried not knowing how to go about my project but the day i searched online and saw iprojectmaster, i called and got my full project in less than 15minutes, i was shocked!
Excellent
Abraham Ogbanje
NATIONAL OPEN UNIVERSITY OF NIGERIA
At first I was afraid.. But I discovered they are legit. I will bring more patronize
Very Good

FREQUENTLY ASKED QUESTIONS

How do I get this complete project on AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION?

Simply click on the Download button above and follow the procedure stated.

I have a fresh topic that is not on your website. How do I go about it?

How fast can I get this complete project on AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION?

Within 15 minutes if you want this exact project topic without adjustment

Is it a complete research project or just materials?

It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data

What if I want to change the case study for AN IMPROVED IMAGE STEGANOGRAPHY BASED ON LEAST SIGNIFICANT BIT MATCHING REVISITED (LSBMR) USING SOBEL EDGE DETECTION, What do i do?

Chat with Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

How will I get my complete project?

Your Complete Project Material will be sent to your Email Address in Ms Word document format

Can I get my Complete Project through WhatsApp?

Yes! We can send your Complete Research Project to your WhatsApp Number

What if my Project Supervisor made some changes to a topic i picked from your website?

Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

Do you assist students with Assignment and Project Proposal?

Yes! Call Our Instant Help Desk Now: +234 813 292 6373 and you will be responded to immediately

What if i do not have any project topic idea at all?

Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 813 292 6373

How can i trust this site?

We are well aware of fraudulent activities that have been happening on the internet. It is regrettable, but hopefully declining. However, we wish to reinstate to our esteemed clients that we are genuine and duly registered with the Corporate Affairs Commission as "PRIMEDGE TECHNOLOGY". This site runs on Secure Sockets Layer (SSL), therefore all transactions on this site are HIGHLY secure and safe!