increase in one of the factors leads to the decrease inother [9].Though, there are many data hiding techniques [2, 3,4], in this paper, we consider the spatial domain ofdata hiding. We discuss the various data hidingtechniques using bit manipulation of the lowestsignificant bit (LSB). We take a look at how the bitplanes can be increased by various numberdecomposition methods without compromising onthe three requirements of visibility, robustness andcapacity.The rest of the paper is organized as follows. InSection 2 we take a look at the classical LSB datahiding technique. Here we discuss how secret text canbe embedded in cover image using LSB manipulation.Section 3 of the paper contains the Fibonacci LSB datahiding technique. Section 4 of the paper contains theLSB data hiding technique using decomposition ofprime numbers. The approach for decompositionusing prime numbers is discussed here. Section 5contains LSB data hiding by natural numbers. Here thedecomposition of bit planes by natural numbers isdiscussed. In Section 6 we present a comparativeanalysis between the various LSB data hidingmethods. Finally, in Section 7, we present theconclusion for the paper.CLASSICAL LSB DATA HIDING TECHNIQUEOne of the simplest implementation of data hidingtechnique is the classical least significant bit datahiding technique [18]. The technique is based onmanipulation of the least significant bits of the carrierimage to accommodate the hidden message.The insertion of LSB varies according to the number ofbits in an image. For an 8 bit image, the value of 8 thbit, which is the least significant bit of each pixel,would be modified and the secret message would beembedded [19].Suppose if we wanted to insert the letter ‘A’ into animage. The binary equivalent of ‘A’ is 10000001. Now ifour sample image of 8 bit has the following pixelvalues:10101010 10001010 11111111 01011010110101010 10101010 10001011 10101111So, embedding the binary equivalent of ‘A’ i.e.10000001would change the pixel values of our sampleimage to:101010101 10001010 111111110 01011010010101010 10101010 10001010 0101111In our sample image the least significant bit value ofpixel 1, 3, 4 and 7 have been changed.Similarly, for an image of 24 bit, we need to changethe RGB (Red Blue Green) color values. Suppose oursample image has the following pixel values,[10010101 10101010 11110101][10001001 10001110 10000010]128ACTA TECHNICA CORVINIENSIS – Bulletin of Engineering[11110101 01001010 10001011]So to accommodate our desired character, ‘A’, wehave to make the following modifications:[10010101 10101010 11110100][10001000 10001110 10000010][11110100 01001010 10001011]So, basically we have changed the values of 3 bit toaccommodate our desired character.Though, classical data hiding is simple to implement, itis vulnerable to image manipulation [15].LSB DATA HIDING USING FIBONACCI NUMBERSBattisti et al. [1] proposed a method of embeddingdata into digital media by decomposition of Fibonaccinumber sequence which allowed different bit planedecomposition when compared to the classical LSBscheme.The Fibonacci sequence, named after Leonardo ofPisa, also known as Fibonacci, is a sequence ofnumbers in the following integer sequence:0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89 …The Fibonacci numbers are defined by a recurrencerelation:F p (0) = F p (1) = 1F p (n) = F p (n – 1) + F p (n – p – 1), ∀ n ≥ 2, n∈NThe bit planes are now decomposed based on theFibonacci sequence. The main drawback of thisapproach is that of redundancy and to counter thatand obtain a unique representation, Zeckendorftheorem [20] is used.To embed the intended message in the cover image, itis decomposed into bit planes by using Fibonacci p‐decomposition. The Zeckendorf condition is checkedfor each bit to be modified. If the condition is fulfilled,the bit is inserted otherwise the bit following it isconsidered.LSB DATA HIDING USING PRIME NUMBERSLSB data hiding using prime numbers is a data hidingtechnique proposed by Dey et.al [10] as animprovement over the Fibonacci numbers data hidingtechnique proposed by Battisti et. al. The main idea ofthe work was to use the prime number decompositionand generate new set of bit planes and embedinformation in these newly generated bit planes withminimal distortion.In this approach, the researchers took an image of mbits and increased the number of bit planes to n,where the value of n was equal or greater than orequal to the number of bit planes of the image. Thiswas achieved by converting the bit planes of theimage to another number system using primenumbers as the weighted function. This resulted in theincrease of number of bits and consequently it couldbe used for hiding data in higher bit planes withminimal distortion.2012. Fascicule 3 [July–September]
ACTA TECHNICA CORVINIENSIS – Bulletin of EngineeringFor decomposition, the weight function was definedas:P (0) = 1, P (i) = p i ∀ i ∈ Z + , p i = i th PrimeIn case of any ambiguity, the lexicographically highernumber is given preference.For embedding the data in the image, a number n ischosen in such a way that all possible pixel values inthe range of [0, 2 k ‐ 1] could be represented using firstn prime number, so that n virtual are achieved afterthe decomposition.The value of n can be found out by the formula,n‐1∑ +p 2i 0 i≥k‐ 1After finding the prime numbers, a k‐bit to n‐bitsequence is mapped, marking all the valid primenumber in the system. Now, for each pixel of theimage, a virtual bit plane is chosen and secret data isembedded is by modifying the corresponding virtualbit plane by the desired information bit by bit. If theresulting sequence of data after embedding the datamatches the k‐bit to n‐bit mapping, the bits are keptotherwise it is discarded. After insertion of the hiddendata, the resultant prime number system is convertedback to the original binary system and the stegoimageis achieved.For extraction, each pixel with the hidden informationis converted into prime decomposition and from thosebit planes, the secret message is extracted. All the bitsare combined together to get the final message.LSB DATA HIDING USING NATURAL NUMBERSThe approach of LSB data hiding by natural numberswas proposed by Dey et.al [11]. In this approach, theresearchers proposed data hiding by decomposition ofa pixel value in sum of natural numbers. This resultedin generation of more bit planes than the Classical LSBdata hiding, Fibonacci LSB data hiding and the Primenumber data hiding [10].For decomposition, the weight function is defined as:W (i) = N (i) = i + 1, ∀ I ∈ Z + ∪ {0}The researchers used the same concept in case ofambiguity which gave higher precedence tolexicographically higher number.For embedding the data into the k‐bit image, anumber n is chosen in a way such that all pixel valuesin the range of [0, 2 k – 1] could be represented usingfirst n numbers, which resulted in generation of nvirtual bit planes .The value of n can be found out by the formula,k + 3‐ 1 ± 2 + 9n ≥2After finding the value of n, a k‐bit to n‐bit map iscreated and all valid representations in naturalnumbers system are marked. Now, for each pixel avirtual bit plane is chosen and the secret data isembedded. If the virtual bit plane matches themapping system, the hidden data is kept otherwise itis discarded. After insertion of the secret message, thenatural number system is converted back to itsoriginal binary form and the stego‐image is achieved.To extract the message from the stego‐image, all thepixels with embedded data bit are converted to thenatural number decomposition, and the secretmessage bits are extracted. Finally, all bits arecombined together to get the embedded hiddenmessage.COMPARISON OF LSB DATA HIDING TECHNIQUESIn the previous section, we have looked at the varioustechniques for data hiding using numberdecomposition. Here, we present a comparativeanalysis between the various data hiding techniquesusing number decomposition.Table 1. Technique used in LSB data hidingClassical LSB data hiding uses thesimplest approach. In classical LSB dataClassical LSB hiding, the least significant bit of a pixelis manipulated in order to embed thedesired image.In Fibonacci approach, the bit planes aredecomposed so as to generate more bitFibonacciplanes and then the secret message isTechniqueembedded on following the Zeckendorftheorem.LSB datahiding byprimenumbersLSB datahiding bynaturalnumbersIn LSB data hiding using prime numbers,the bit planes are decomposed by usingsum of prime numbers. After that thesecret message is embeddedlexicographically.In LSB data hiding using natural numbers,the bit planes are decomposed by usingsum of natural numbers. Here also thesecret message is embeddedlexicographically.Table 2. Embedding Techniques used in LSB data hidingData are inserted in the least significantClassical LSBbit of the cover image.Technique uses Fibonacci P‐sequence forFibonacci generation of bit planes and data isTechnique inserted if it passes the Zeckendorfcondition.LSB datahiding byprimenumbersLSB datahiding bynaturalnumbersA k‐bit to n‐bit map is created where thevalue of n is,n‐1k∑ p 2 ‐ 1i + 0 i≥Data is inserted bit by bit matching the k‐bit to n‐bit mapping sequence.A k‐bit to n‐bit map is created where thevalue of n is,k + 3‐ 1 ± 2 + 9n ≥2Data is inserted bit by bit matching the k‐bit to n‐bit mapping sequence.2012. Fascicule 3 [July–September] 129
- Page 2 and 3:
ACTA TECHNICA CORVINIENSIS- BULLETI
- Page 4 and 5:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 6 and 7:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 8 and 9:
Regional Editors from MALAYSIAAbdel
- Page 10 and 11:
Imre TIMÁRUniversity of Pannonia,
- Page 12 and 13:
Ioan MILOŞANTransilvania Universit
- Page 14 and 15:
Member from GREECENicolaos VAXEVANI
- Page 16 and 17:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 18 and 19:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 20 and 21:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 22 and 23:
two decades are seismically deficie
- Page 24 and 25:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 26 and 27:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 28 and 29:
The Euler ecuation about the condit
- Page 30 and 31:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 32 and 33:
examination centre of the Hungarian
- Page 34 and 35:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 36 and 37:
elieve that they are communicating
- Page 38 and 39:
converting the data also increases
- Page 40 and 41:
REFERENCES[1.] Bhavyesh Divecha, Aj
- Page 42 and 43:
In addition, API (Application Progr
- Page 44 and 45:
The new protocol has to be implemen
- Page 46 and 47:
compressor, the now hot and highly
- Page 48 and 49:
Figure 7. Pressure ratio of evapora
- Page 50 and 51:
Physical data model (MFD) is obtain
- Page 52 and 53:
The new project which now includes
- Page 54 and 55:
Figure 3. Materials evolutionThe pr
- Page 56 and 57:
(GPa) and weight used in the textil
- Page 58 and 59:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 60 and 61:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 62 and 63:
A machine vision‐guided plant sen
- Page 64 and 65:
During the experiment, non‐unifor
- Page 66 and 67:
espectively velocities hodograph (v
- Page 68 and 69:
generation and thermal‐diffusion
- Page 70 and 71:
70(Pr−1)=bGm( R −cPr)( − M+c
- Page 72 and 73:
72Figure 12: Sherwood Number for di
- Page 74 and 75:
ACTA TECHNICA CORVINIENSIS - Bullet
- Page 76 and 77:
The hardware components offer the p
- Page 78 and 79: Markers 1 (t=‐60 ms) and 2 (t=‐
- Page 80 and 81: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 82 and 83: compensation, apply dynamic control
- Page 84 and 85: A. Impact on transmission line prot
- Page 86 and 87: [12.] W.H. Zhang, S.J. Lee, M.S. Ch
- Page 88 and 89: Substituting equations (2), (3), (4
- Page 90 and 91: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 92 and 93: the tribological experiment to simu
- Page 94 and 95: It is difficult to determine temper
- Page 96 and 97: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 98 and 99: where: “ν ” represents the con
- Page 100 and 101: Figure 10. The velocity field in a
- Page 102 and 103: made on demand. In this type of pro
- Page 104 and 105: traditional MANET routing protocol
- Page 106 and 107: and classification,” In Journal o
- Page 108 and 109: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 110 and 111: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 112 and 113: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 114 and 115: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 116 and 117: equipped with tube made from stainl
- Page 118 and 119: Fig. 10 ‐ The die, the blank hold
- Page 120 and 121: desktop, it must be based on runtim
- Page 122 and 123: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 124 and 125: database, which makes it possible t
- Page 126 and 127: technology - „Applied logistics
- Page 130 and 131: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 132 and 133: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 134 and 135: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 136 and 137: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 138 and 139: ACTA TECHNICA CORVINIENSIS - Bullet
- Page 140 and 141: ACTA TECHNICA CORVINIENSIS - Bullet