ArticlePDF Available

Bit Pattern Selection Based Novel Method of Steganography in RGB Encoding Scheme Based Digital Images

Authors:

Abstract and Figures

We proposed a novel technique of steganography that hides information in images. When secret information is hidden in the image, there are less than 1.0% chances of change in image quality. We segregated literals of a message into 3, 3 and 2 bits and matched these bit patterns from red, green, and blue components of the cover image pixels. Hence, noting down these harmonized pixels, yields LOG table, which is encrypted using Rijndael Managed algorithm. We made an analysis between the reported method and other state-of-the-art steganographic techniques and found it successful.
Content may be subject to copyright.
ISSN: 2666-2795 Vol. 7 No. 1, 2022, Netherland
International Journal of Applied Engineering Research
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
78
Bit Pattern Selection Based Novel Method of
Steganography in RGB Encoding Scheme Based Digital
Images
Ghulam Gilanie*, Syeda Naila Batool, Aqsa Khursheed, Hina Shafique, Nimra Mahmood, Sana Cheema,
Akkasha Latif, Muhammad Sajid, Muhammad Saeed
Department of Artificial Intelligence, Faculty of Computing, The Islamia University of Bahawalpur,
Pakistan.
Email addresses
: ghulam.gilanie@iub.edu.pk, nailashah313@gmail.com, aqsakhursheedbwp@gmail.com,
hinach1912@gmail.com, nimramahmoodbwp@gmail.com, sanacheema887@gmail.com,
akashacheema70@gmail.com, muhammad.sajid@iub.edu.pk, msaeed4771@gmail.com
Abstract: We proposed a novel technique of steganography that hides information in images. When secret
information is hidden in the image, there are less than 1.0% chances of change in image quality. We segregated
literals of a message into 3, 3 and 2 bits and matched these bit patterns from red, green, and blue components of
the cover image pixels. Hence, noting down these harmonized pixels, yields LOG table, which is encrypted using
Rijndael Managed algorithm. We made an analysis between the reported method and other state-of-the-art
steganographic techniques and found it successful.
Keywords: Steganography, LOG table, Rijndael Managed algorithm, Image Analysis
1.0 Introduction
Steganography is an art of hiding data in some media, preferably the digital media. Although, steganography is a prehistoric
skill, however, computation makes it a powerful tool today [1]. Steganography enables us to obscure a secret message from
the outside work rather than concealing the contents of a message like cryptography, hence more secluded technique than
any other competitor manner of message hiding [2]. It changes to cover image to implant secret message to communicate in
any standard format so that these changes are not detectable by foreign. Throughout history, people needed to communicate
with each other, and now an ever-increasing number of people are using electronic means to send their messages. These
same people are also becoming more aware of their right to privacy, and how many governments are introducing new laws to
combat terrorism without thinking about the right to privacy of the average. Now, just encrypting emails is not sufficient,
and with more computer viruses in circulation and the advent of spyware being used to steal personal information and
documents from home computers, it has become necessary to ensure that a user’s personal files are secure from attack.
Encrypting individual files solved this problem but in doing so introduced another: if it’s encrypted it must be worth
encrypting [3-11].
Steganography is information hiding into some channel [12]. The channel may be audio, video, text, protocol, or an image.
When information is embedded into some media/channel, the quality of source media is disturbed. In the case of an image,
the image quality is also affected. There are some techniques available in literature to hide data into images, each one with its
pros and cons. Even, different image formats have different methods of information hiding into them [13]. Different
researchers are utilizing steganography techniques for some security purposes. There are two similar terms steganography and
cryptography used in the way that they both protect important information. Steganography involves hiding information
while cryptography encrypts the information [14, 15], while the proposed method deals only steganography. The proposed
method is very novel in its nature that there is only less than 1% chance of change in image intensity values. The proposed
method divides each token of a message into three identical literals, and then the patterns of literals are matched with the
Ghulam Gilanie et.al.
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
79
individual pixels of the image from each red, green, and blue portions. Where these three literals are matched, their position
and length of a literal are packed to form a byte. Hence a table namely LOG table is generated. This generated LOG table is
then encrypted using Rijndael managed encryption algorithm.
In this research work, we focused on novel image steganography techniques and compared the results with other traditional
techniques reported for the same purpose. These include Least Significant Bit (LSB) and its modified versions namely LSB
with a single character per two consecutive pixels, LSB with a random selection of pixels, and LSB with a character per two
pixels with random selection. The histogram-based analysis shows that the proposed method is better than the traditional
LSB methods. It causes minimum variations in the original color tone, which are impossible for the human eye to perceive
and in many ways even undetectable during steg-analysis.
2.0 Literature review
l-Shatnawi et al., [16] proposed a novel approach of steganography, which searches identical bits between the message and
the individual pixels of the image to hide text into these pixels. It has the main drawback that any hacker can detect the
original text from the image with different combinations of bit patterns. Sadaf et al., [17] hide text in the randomly selected
colored image of arbitrary size, using wavelet transform with the only drawback that the steg-analysis can easily detect the
stego text from the cover image. Gutub et al., [18] introduced the concept of storing a variable number of bits in each
channel of a pixel, based on the actual color values of that pixel. The main drawback of the method is the extra payload
added with the actual pixel values resulting in a poor quality stego image. Khare et al., [19] designed a system that allows an
average user to securely transfer text messages by hiding them in a digital image file using the local characteristics with in an
image. However, the sender must calculate the local characteristics him/herself. Budhiraja et al., [20] studies invisible
communication that usually deals with the ways of hiding the existence of the communicated messages. Parvez et al., [21]
reported the RGB image based steganography method for storing a variable number of bits in each RGB channel based on
the color value of each pixel. However, they changed the least significant bits of channels, consequently affecting the image
quality. Bennett at al., reported that channels in which information can be hidden, and increasingly, reported sophisticated
techniques to analyze and recover that information.
3.0 Proposed method
In RGB encoded color images, each pixel has at least three components, i.e., red, green, and blue. Each component is
represented by a separate 8-bit value. So, the intensity value of each component can range from 0 to 255 only. Represented
as decimal, for ease of human perception and reading, a value of (255, 0, 0) would describe a 100% red pixel ( ). By mixing
the contribution of each component, a large palette of colors can be represented.
Value mixtures such as (31, 187, 57) result in a shade of green ( ), while (255, 255, 0) represents pure yellow ( ). When
any specific color is viewed closely, single digit modifications to the contribution level are imperceptible to the human eye i.e.
a pixel with a value of (255, 255, 0) representing this yellow color ( ) is indistinguishable from color with value of (254, 255,
0) representing a slightly different shade of yellow ( ). No matter which technique is used for image steganography, image
quality is at compromise. A decrease in image quality leads to detection during attack or steg analysis. To prevent even the
minimum degradation of image quality, a novel method is proposed in this research work. It finds a pattern of the bit
sequences of what is to be hidden in the original pixel values of the image. Hence, eliminating the need to alter the cover
image in any way for almost all the character sequences of the secret message.
Let I be the cover image and T be the text to stego inside a cover image. For pattern matching, the bit sequences of each
character of the T are grouped as 03 (three) MSBs, 03 (three) middle bits and 02 (two) LSBs, named as Lit1, Lit2 and Lit3
respectively. The pattern making process of a sample character ‘A’ is depicted in Table 1.
Bit Pattern Selection Based Novel Method of Steganography in RGB Encoding Scheme Based Digital Images
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
80
Table 1. Pattern making process of sample character ‘A’
Character
ASCII Value
Binary
Literal1 (Lit1)
Literal2 (Lit2)
A
65
0100 0001
010
000
Upon having literals of T, these are matched with bit sequences of color components of each pixel of I. The process of
pattern matching starts from MSB of the first pixel of the image. Sequentially searching for bit patterns of each literal. If any
of the patterns is not matched with any of the color components, the next pixel of I is selected for pattern matching. The bit
pattern matching process always starts from MSB, for instance Lit 1 is compared with 8th, 7th and 6th bit, if it is not a
match then move on to the 7th, 6th and 5th bits and so on in red component. Lit 2 and Lit 3 are searched from green and
blue components respectively.
If a pattern is matched successfully, the respective information is stored in a byte. This byte is named as Literal and post-fixed
with a number according to the pattern whose information it holds, i.e., Literal1 for Patter1, Literal2 for Pattern 2 and
Literal3 for Pattern 3 respectively. Each Literal stores the information as per format described in Table 2.
Table 2. Literal format
Literal (00-0000-00)(MSB to LSB)
First 2 bits
Next 4 Bits
Last 2 Bits
The color component where the pattern was
found.
00 for RED
01 for GREEN
10 for BLUE
11 reserved for future use
The starting bit position where the
pattern was found. The maximum
value that can be stored is
1000b
(8th
bit), which is the MSB in a byte.
Number of bits in the
pattern, either 2(10) or
3(11)
In the rarest case, if a pattern is not found in any of the pixel values of the image, the character byte is embedded into one of
the pixels by the LSB method. But even for this, it is ensured that the most suitable pixel is selected to modify, i.e., the pixel
whose bit sequences match at least two of the patterns while the third one is embedded into the color component from
which neither of the two other patterns was found. In case a pixel is modified, we also need to know and keep track of it,
where and how it was modified, i.e., which color component was modified, and the number of bits that were modified. This
requires a byte, whose 1st three bits (from MSB to LSB) show the color component (100 for Red, 010 for Green and 001 for
Blue) and the last 2 bits indicate the number of bits modified. Furthermore, it will be ensured that this pixel is not modified
in future for similar cases of
unsuccessful matching.
The data structure used in this proposed method to store the information of character patterns is a LOG table containing
two integers and 4 bytes in each row. The first integer holds the value of the character index of T, the second integer holds
the pixel number of the I, the next three bytes contain the three literals respectively, while the last byte indicates whether the
pixel was modified or not.
When this process is completed, and a LOG is generated, it is then encrypted using the Rijndael Managed encryption
algorithm. The cover image along with encrypted LOG table is communicated to the destined location. This extraction of
secret message from the cover image and sending them separately exploits the dependency of the LOG table on the cover
image and vice versa; making it a challenge for attackers to extract the secret message when they have only one of the objects
in hand. The flowchart of the proposed algorithm is depicted in Figure 1.
Algorithm
Step1. [Initialize] I= Image
Step2. [Initialize] T= Text
Ghulam Gilanie et.al.
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
81
Step3. [Initialize] Counter=1
Step4. WHILE (T(i)! =NULL) DO
a. Lit1=3 MSB of T(i)
b. Lit2=2 LSB of T(i)
c. Lit3=3 Middle bits of T(i) (excluding Lit1 and Lit2)
d. WHILE (I(i)! = NULL && LOG (I)(i+4) =FALSE) DO
a. Rcom=I(i)(r) //Red Component of Pixel I(i)
b. Gcom=I(i)(g) //Green Component of Pixel I(i)
c. BCom=I(i)(b) //Blue Component of Pixel I(i)
d. [Initialize] ir=8
e. WHILE (ir>=3) DO
i. IF (Lit1= Rcom(ir) THEN
1. Break.
ii. ELSE
1. ir=ir-1
iii. END IF
f. END WHILE
g. [Initialize] ig=8
h. WHILE (ig>=3) DO
i. IF (Lit2= Gcom(ig) THEN
1. Break.
ii. ELSE
1. ig=ig-1
iii. END IF
i. END WHILE
j. [Initialize] ib=8
k. WHILE (ib>=2) DO
i. IF (Lit3= Bcom(ib) THEN
1. Break.
ii. ELSE
1. ib=ib-1
iii. END IF
l. END WHILE
e. IF (ir>=3 && ig>=3 && ib>=2) THEN
a. Lit1Info=00+ir+11
b. Lit2Info=01+ig+11
c. Lit3Info=11+ib+10
d. LOG (I)(i) =Counter
e. LOG(I)(i+1) =Lit1Info
f. LOG(I)(i+2) =Lit2Info
g. LOG(I)(i+3) =Lit3Info
h. LOG(I)(i+4) =FALSE
f. END IF
Bit Pattern Selection Based Novel Method of Steganography in RGB Encoding Scheme Based Digital Images
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
82
a. I(i)=I(i)+i
b. Counter=Counter+1
g. END WHILE
a. T(i)=T(i)+1
h. END WHILE
Step5. STOP
Step6. END Algorithm
Figure 1. Flow chart of the proposed algorithm
4.0 Results and discussion
F
F
F
Input Original
Message (T)
Get individual next
character T(i) from text
to write into Image (I)
Lit1=3 MS bits of T(i)
Lit3=2 LS bits of T(i)
Lit2= 3 Middle bits of
T(i)(excluding 3 MSB’s and 2 LSB’s)
Input Coloured
Image (I)
Rcom=I(i)(r)
Gcom=I(i)(g)
Bcom=I(i)(b)
ir=8
IF(I(i)!=NULL
&&LOG(I)(i+4)
=FALSE)
Get Individual next
Pixel I(i) from input
Image (I)
WHILE
(ir>=3)
IF(Lit1=R
Com(ir))
T
T
T
ir=ir-1
F
WHILE
(ig>=3)
IF(Lit2=G
com(ig))
T
ig=ig-1
F
ig=8
WHILE
(ib>=2)
IF(Lit3=B
com(ib))
T
ib=ib-1
F
ib=8
T
T
IF(ir>=3ANDig
>=3ANDib>=2)
L1Info=00+ir+11
L2Info=00+ig+11
L3Info=00+ib+10
T
F
STOP
F
Ghulam Gilanie et.al.
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
83
For research and experimental purposes, images of different categories of size 256×256 were used. Figure 2 (a)
shows the cover bitmap Lena image. Figure 2 (b) shows its histogram and Figure 2(c) shows a “TEXT” file
containing 34000 characters, which were used to embed into cover image. Figure 3 (a) shows the image after
embedding the data into it by the sequential pixel selection and LSB embedding method. Figure 3 (b) shows the
histogram of Figure 3(a). It is visually perceivable from Figure 2 (a) and Figure 3 (a) and their respective histograms
shown in Figure 2 (b), and Figure 3(b) that there is minor difference in image which is not easily interpretable by the
human eye. However, there is some change in image quality after embedding text into it. To verify the extent of
change in image after steganography, we calculated the difference between them and visualized the difference in Figure
3 (c) represented by red lines. This is the actual change occurred in cover image after steganography using sequential
ordering of storing data into pixels on LSB one character per pixel. Data was embedded into an image with the format
as 3 bits at RED component, 3 bits at GREEN component and 2 bits of BLUE component of each sequentially
selected pixel.
Figure 2 (a) Original BMP Portrait Image (Lena) (b) Histogram of the image shown in Figure 2(a) (c) The text file to
hidden in the image.
(a) (b) (c)
(a) (b) (c)
Hidden Text:
A text file was containing
34,000 characters
Bit Pattern Selection Based Novel Method of Steganography in RGB Encoding Scheme Based Digital Images
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
84
(d) (e) (f)
(g) (h) (j)
(j) (k) (l)
No Change in Histogram
(m) (n) (o)
Ghulam Gilanie et.al.
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
85
(p)
Figure 3 (a) stego image after LSB sequential (b) histogram of image shown in 3 (a), (c) histogram showing the
change between the image shown in 2(b) and 3(b), (d) stego image after LSB sequential one char/ two pixels (e)
histogram of image shown in 3 (d), (f) histogram showing the change between 2(b) and 3(e), (g) stego image after
LSB modification on random pixel selection (h) histogram of image shown in 3 (g), (i) histogram showing the
change between the histograms shown in 2(b) and 3(h), (j) stego image after LSB random one char/two pixels (k)
histogram of image shown in 3 (j), (l) histogram showing the change observed in 2(b) and 3(j) , (m) stego image after
proposed algorithm (n) histogram of image shown in 3(m), (o) histogram showing the change the in histograms
between 2(b) and 3(m), (p) the LOG table generated after applying proposed method of steganography on image
shown in 2(a)
Figure 3 (d) shows the image after embedding the text message into it with sequential pixel selection where each
character byte was embedded on each two consecutive pixels. Figure 3 (e) shows the histogram of Figure 3 (d). It is also
visually perceivable from the images shows in Figure 2 (a) and Figure 3 (a) and their histograms are shown in Figure 2
(b) and Figure 3 (b) respectively that there is minor change in the image quality, which is not easily detectable by naked
human eye. Therefore, to highlight the difference between these two ones, we calculate the difference of histograms as
shown in Figure 3 (f) shown in red lines. Hence little changes are also observed in the image after embedding text
using sequential pixel selection of one character at two consecutive pixels. These were the changes, occurred in the
cover image after applying steganography using the LSB embedding methods with sequential pixel selection, while
each character byte is divided upon two consecutive pixels, where one bit modifies the LSB of RED component; next
bit modifies the LSB of GREEN component, next two bits modify the BLUE component of the 1st pixel. Hence, the
same pattern modifies the color components of the 2nd pixel in the same order.
Figure 3 (g) shows the image obtained after steganography when random pixels are selected to embed text while Figure
3 (h) shows the histogram of figure shown in Figure 3 (g). Here the difference between the cover and stego image
though can’t be perceived, so, their difference is shown in Figure 3 (i). From Figure 3 (i), it is observed that the change
in stego image is identical to the stego image shown in Figure 3 (c), but the change occurred in the stego image globally
due to random selection of pixels.
Figure 3 (j) shows resultant stego image obtained after steganography with method like that used in Figure 3 (d) with
the only difference that the pixels are selected randomly. Figure 3 (k) shows the histogram of the figure shown in
Figure 3 (j), while Figure 3 (l) shows the difference between the histograms values of Figure 3 (b) and Figure 3 (k). The
Bit Pattern Selection Based Novel Method of Steganography in RGB Encoding Scheme Based Digital Images
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
86
observed changes are almost equal to the changes, occurred in single sequential character per two pixels. However, due
to random pixel selection, the changes are dispersed in the image. Conclusively, these previously described data
embedding techniques, first, are similar and secondly, cause changes in image quality, which is easily detectable by any
of the automated systems.
Figure 3 (m) shows the stego image obtained through the proposed novel method of steganography after embedding
the same text file containing 34000 characters. Figure 3 (n) shows the histogram of the stego image shown in Figure 3
(m). It is verified from Figure 3(o) that the proposed method doesn’t modify the pixels of the cover image. Resultantly,
no change occurred even in a single pixel of the cover image. Rather, a pattern selection technique is applied for
extracting the bit pattern of characters from the byte values of different color components of the pixel. The extracted
information is saved into a LOG table as shown in Figure 3 (p).
5.0 Conclusion
In this research work, we proposed and implemented a novel method of steganography, which is so efficient that there
is less than 1% chance of change in image quality. The proposed method generated appreciative results when applied
to different types of images. The proposed method partitioned the literal of text into three literals and searched for
their patterns in pixel components. After successful matching of text message character bits, the findings are packed
into bytes and are stored in a LOG table. The LOG table is then encrypted using Rijndael Managed encryption
algorithm for added security when sent on communication channel. Experiments showed that more than 99% of
images already contain literal patterns, eliminating the need to modify any on the image bit to hide information from
it. LOG table works as a secret key, hence no need for a further key to generate and to transfer along with cover image.
References
[1] M. Attique et al., "Colorization and Automated Segmentation of Human T2 MR Brain Images for
Characterization of Soft Tissues," PLoS ONE, doi:10.1371/journal.pone.0033616 vol. 7, no. 3, p. e33616,
2012.
[2] G. Gilanie, M. Attique, U. Hafeez, S. Naweed, E. Ahmed, and M. Ikram, "Object extraction from T2
weighted brain MR image using histogram based gradient calculation," Pattern Recognition Letters, vol. 34, no.
12, pp. 1356-1363, 2013.
[3] A. Anderson, "Steganography: an Inside Look at Hiding Messages and Data," University of Exeter, 2006.
[4] G. Gilanie, U. I. Bajwa, M. M. Waraich, and M. W. Anwar, "Risk-free WHO grading of astrocytoma using
convolutional neural networks from MRI images," Multimedia Tools and Applications, vol. 80, pp. 4295-4306,
2021.
[5] G. Gilanie et al., "Coronavirus (COVID-19) detection from chest radiology images using convolutional neural
networks," Biomedical Signal Processing and Control, vol. 66, p. 102490, 2021.
[6] G. Gilanie, U. I. Bajwa, M. M. Waraich, and Z. Habib, "Automated and reliable brain radiology with texture
analysis of magnetic resonance imaging and cross datasets validation," International Journal of Imaging Systems
and Technology, vol. 29, no. 4, pp. 531-538, 2019.
[7] G. Gilanie, N. Nasir, U. I. Bajwa, and H. Ullah, "RiceNet: convolutional neural networks-based model to
classify Pakistani grown rice seed types," Multimedia Systems, pp. 1-9, 2021.
[8] G. Gilanie, H. Ullah, M. Mahmood, U. I. Bajwa, and Z. Habib, "Colored Representation of Brain Gray Scale
MRI Images to potentially underscore the variability and sensitivity of images," Current Medical Imaging, vol.
14, no. 4, pp. 555-560, 2018.
Ghulam Gilanie et.al.
Copyrights @ Roman Science Publications Vol. 7 No. 1 June, 2022, Netherland
International Journal of Applied Engineering Research
87
[9] K. Asghar, G. Gilanie, M. Saddique, and Z. Habib, "Automatic enhancement of digital images using cubic
Bézier curve and Fourier transformation," Malaysian Journal of Computer Science, vol. 30, no. 4, pp. 300-310,
2017.
[10] G. Gilanie, U. I. Bajwa, M. M. Waraich, and Z. Habib, "Computer aided diagnosis of brain abnormalities
using texture analysis of MRI images," International Journal of Imaging Systems and Technology, vol. 29, no. 3, pp.
260-271, 2019.
[11] M. J. Iqbal, U. I. Bajwa, G. Gilanie, M. A. Iftikhar, and M. W. Anwar, "Automatic brain tumor segmentation
from magnetic resonance images using superpixel-based approach," Multimedia Tools and Applications, vol. 81,
no. 27, pp. 38409-38427, 2022.
[12] N. F. Johnson and S. Jajodia, "Exploring Steganography: Seeing the Unseen," Computing Practices, vol. 1, no.
1, pp. 26-34, 1998.
[13] S. K. Bandyopadhyay, D. Bhattacharyya, D. Ganguly, S. Mukherjee, and P. Das, "A Tutorial Review on
Steganography," UFL & JIITU, vol. 1, no. 1, pp. 105-114, 2008.
[14] A Joseph Raphael and V. Sundaram, "Cryptography and Steganography A Survey," International Journal of
Computer technology and applications, vol. 2, no. 3, pp. 626-630, 2011.
[15] Khalil Challita and H. Farhat, "Combining Steganography and Cryptography: New Directions," International
Journal on New Computer Architectures and Their Applications (IJNCAA), vol. 1, no. 1, pp. 199-208, 2011.
[16] A. M. Al-Shatnawi, "A New Method in Image Steganography with Improved Image Quality," Applied
Mathematical Sciences, vol. 6, no. 79, pp. 3907-3915, 2012.
[17] D. M. Y. Saddaf Rubab, "Improved Image Steganography Technique for Colored Images using Huffman
Encoding with Symlet Wavelets," International Journal of Computer Science Issues, vol. 9, no. 2, pp. 1694-0814,
2012.
[18] M. T. Parvez and A. A. A. Gutub, "RGB Intensity Based Variable-Bits Image Steganography," in Asia-Pacific
Services Computing Conference, 2008. APSCC '08. IEEE, 2008, pp. 1322-1327.
[19] Akhil Khare , Meenu Kumari, and P. Khare, "Efficient algorithm for digital image steganography " Journal of
information, knowledge and research in computer science and applications, vol. 1, no. 1, pp. 1-5, 2014.
[20] B. Dunbar, "A detailed look at Steganographic Techniques and their use in an Open-Systems Environment,"
SANS Institute InfoSec Reading Room, vol. 1, no. 1, pp. 1-11, 1/18/2002.
[21] Shikha Sharda and S. Budhiraja, "Image Steganography: A Review," International Journal of Emerging Technology
and Advanced Engineering, vol. 3, no. 1, pp. 707-710, 2013.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
Cancer is the second leading cause of deaths worldwide, reported by World Health Organization (WHO). The abnormal growth of cells, which should die at the time but they remained in body organ which makes tumor and brain tumor is one of them. During its treatment planning, brain tumor segmentation plays its vital role, Magnetic Resonance Imaging (MRI) is most widely used medical imaging modalities to scan brain tissues, and segmentation of brain tumor from MRI scans is still a challenging task, due to the variability in spatial, structure and appearance of the brain tumor. The existing brain tumor segmentation techniques are still suffering from an inadequate performance, dependent on initial assumptions, and required manual interference. The main challenge is to segment out the accurate tumor from MRI images, and to give the solution for its variability in size due to spatial change in image slices. The proposed model in an automated manners segment out abnormal tissues from MRI images. The proposed model has some aspects like we apply some pre-processing techniques, and apply superpixel segmentation with their improved tuned parameter values. We have extracted different features for the superpixels in the images such that statistical features, fractal features, texton features, curvature feature and SIFT features. Due to unbalanced feature vector, we have proposed class balancing algorithm, and then apply SVM, KNN, Decision Tree and Ensemble classifiers, to classify the normal and abnormal superpixels. To evaluate the proposed model, we used MICCAI BRATS-2017 MRI training dataset. The Dice Coefficient (DSC), precision, sensitivity, and balanced error rate (BER) against the ground truths for FLAIR sequence in LGG volumes have been obtained as 0.8593, 87%, 93%, and 0.08 respectively. The DSC, precision, sensitivity, and BER against the ground truths for FLAIR sequence in HGG volumes have been obtained as 0.8528, 87%, 97%, and 0.08 respectively. It is evident from the quantitative and visual results that the proposed model provides a close match to the expert delineation for the FLAIR sequence.
Article
Full-text available
Among other grain-based foods, rice is an important and favorite food of Pakistan. Its demand has increased significantly in the recent era. The type of rice grains is very important for export and import. Therefore, it becomes necessary to distinguish rice types to avoid their fraudulent labeling. With similar aims, a dataset consisting of seven rice varieties, i.e., Basmati 2000, Chenab basmati, KSK 133, Kissan basmati, KSK 434, PK 1121 aromatic, and Punjab basmati, mostly cultivated in Pakistan have been collected and used for rice seed classification. Images of rice seed have been obtained using a self-designed setup, which consists of different seeded, i.e., 1-seeded, 5-seeded, 10-seeded, 15-seeded, and 20-seeded, images. A new model has been designed specifically for rice seed classification using convolutional neural networks, which consists of 18 layers. Standard evaluation measures based on results obtained through the proposed model have been evaluated and compared with both recent state-of-the-art published studies, and state-of-the-art CNN models, i.e., VGG-19, ResNet50, and GoogleNet (Inception-V3). Experiments proved that the proposed model achieved a perfect classification rate, i.e., 100% for each of the Pakistani grown rice seeds. This study is currently integrated with the agro-technology industry for the auto-classification of rice kernel seeds as a demo version.
Article
Full-text available
Astrocytoma is the most common and aggressive brain tumor, in its highest grade, the prognosis is ‘low survival rate’. Spinal tap and biopsy are the methods executed in order to determine the grade of astrocytoma. Once the grade of astrocytoma is determined, treatment is planned to improve the life expectancy of oncological subjects. Spinal tap and biopsy are invasive diagnostic procedures. Magnetic resonance imaging (MRI) being widely used imaging modality to detect brain tumors, produces the large volume of MRI data each moment in clinical environments. Automated and reliable methods of astrocytoma grading from the analysis of MRI images are required as an alternative to biopsy and spinal tape. However, obtaining molecular information of brain cells using non-invasive methods is challenging. In this research work, an automatic method of astrocytoma grading using Convolutional Neural Networks (CNN) has been proposed. Results have been validated on a locally developed dataset, obtained from Department of Radiology (Diagnostics), Bahawal Victoria Hospital, Bahawalpur, Pakistan. The proposed method proved a significant achievement in terms of accuracy as 99.06% (for astrocytoma of Grade-I), 94.01% (for astrocytoma of Grade-II), 95.31% (for astrocytoma of Grade-III), 97.85% (for astrocytoma of Grade-IV), and overall accuracy of 96.56%.
Article
Full-text available
Reliable brain tumor radiology is one of the serious mortality issues of medical hospitals and on priority of healthcare departments. In this research, the presence of brain tumor and its type (if exists) is automatically diagnosed from magnetic resonance imaging (MRI). The first step is most important where suitable parameters from Gabor texture analysis are extracted and then classified with a support vector machine. The drive of this research activity is to verify robustness of the proposed model on cross datasets, so that it could deal with variability and multiformity present in MRI data. Further to this, the developed approach is able to deploy as a real application in the local environment. Therefore, once a model has been trained and tested on an openly available benchmarked dataset, it is retested on a different dataset acquired from a local source. Standard evaluation measures, that is, accuracy, specificity, sensitivity, precision, and AUC‐values have been used to evaluate the robustness of the proposed method. It has been established that the proposed method has the ability to deal with multiformity, variability, and local medical traits present in brain MRI data.
Article
Full-text available
The drive of this study is to develop a robust system. A method to classify brain magnetic resonance imaging (MRI) image into brain‐related disease groups and tumor types has been proposed. The proposed method employed Gabor texture, statistical features, and support vector machine. Brain MRI images have been classified into normal, cerebrovascular, degenerative, inflammatory, and neoplastic. The proposed system has been trained on a complete dataset of Brain Atlas‐Harvard Medical School. Further, to achieve robustness, a dataset developed locally has been used. Extraordinary results on different orientations, sequences of both of these datasets as per accuracy (up to 99.6%), sensitivity (up to 100%), specificity (up to 100%), precision (up to 100%), and AUC value (up to 1.0) have been achieved. The tumorous slices are further classified into primary or secondary tumor as well as their further types as glioma, sarcoma, meningioma, bronchogenic carcinoma, and adenocarcinoma, which could not be possible to determine without biopsy, otherwise.
Article
Full-text available
Image enhancement is one of the most important and visually appealing areas of digital image processing and computer vision. It is considered as a very important part of pre-processing for the development of industrial, security, forensic, medical, and many other applications. Although significant efforts were devoted in the past, a completely automatic image enhancement for all types of input and applications is still a big challenge in the domain of image processing. In this paper, we have proposed a multi-disciplinary approach to enhance the image automatically by intensity transformation in the spatial domain through cubic Bézier curve on images filtered with low and high pass Butterworth in the frequency domain. Results are promising when compared with the existing state-of-the-arts techniques for both visually and quantitatively, which proved that the proposed method can ensure better contrast enhancement.
Article
Coronavirus disease (Covid-19) has been spreading all over the world and its diagnosis is attracting more research every moment. It is need of the hour to develop automated methods, which could detect this disease at its early stage, in a non-invasive way and within lesser time. Currently, medical specialists are analyzing Computed Tomography (CT), X-Ray, and Ultrasound (US) images or conducting Polymerase Chain Reaction (PCR) for its confirmation on manual basis. In Pakistan, CT scanners are available in most hospitals at district level, while X-Ray machines are available in all tehsil (large urban towns) level hospitals. Being widely used imaging modalities to analyze chest related diseases, produce large volume of medical data each moment clinical environments. Since automatic, time efficient and reliable methods for Covid-19 detection are required as alternate methods, therefore an automatic method of Covid-19 detection using Convolutional Neural Networks (CNN) has been proposed. Three publically available and a locally developed dataset, obtained from Department of Radiology (Diagnostics), Bahawal Victoria Hospital, Bahawalpur (BVHB), Pakistan have been used. The proposed method achieved on average accuracy (96.68%), specificity (95.65%), and sensitivity (96.24%). Proposed model is trained on a large dataset and is being used at the Radiology Department, (BVHB), Pakistan.
Article
Steganography" is a Greek origin word which means "hidden writing". Steganography word is classified into two parts: Steganos which means "secret or covered" (where you want to hide the secret messages) and the graphic which means "writing" (text). In this paper, a new Steganography technique is presented, implemented and analyzed. The proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. The proposed method is compared with the LSB benchmarking method. It is implemented to hide the secret message "I will come to see you on the first of June" on two Bmp images, with size (24 x 502 x 333) and (24 x 646 x 165) respectively. The results of the proposed and LSB hiding methods are discussed and analyzed based on the ratio between the number of the identical and the non identical bits between the pixel color values and the secret message values. The proposed method is efficient, simple and fast it robust to attack and improve the image quality, hence it obtained an accuracy ratio of 83%.