Professional Documents
Culture Documents
Stegano Final
Stegano Final
Stegano Final
1.ABSTRACT:
The main part of the project is give security for the images with the hiding of the
data. For this security analysis we are using steganography for giving security
key.these application will be given at the time of film application, social media
applications and multimedia applications. Information Security has always been a
very substantial facet when it comes to hindering unauthorised access, destruction
or inspection of confidential data. Today every field in the world makes use of
multimedia information. There is need to secure the confidential information used
in these areas. There are multiple approaches to secure information. One of them is
Steganography, which is the nothing but hiding the information inside other data
such that there is no detectable change in cover information. The auxiliary
technique of securing information is steganography, an encryption technique which
scrambles the information into a scribbled form which is generally referred to as
cipher. Steganography have their own advantages and limitations. Even though
method provide security, to add multiple layers of security it is always a good
practice to use Steganography. So when steganography are used, it results in multi-
layer security model. The main objective of the proposed work is to provide extra
layer of security by introducing steganography to encrypt and embed the
confidential information
2.INTRODUCTION:
The identification of objects in an image and this process would probably start with
image processing techniques such as noise removal, followed by (low-level)
feature extraction to locate lines, regions and possibly areas with certain textures.
The clever bit is to interpret collections of these shapes as single objects, e.g. cars
on a road, boxes on a conveyor belt or cancerous cells on a microscope slide. One
reason this is an AI problem is that an object can appear very different when
viewed from different angles or under different lighting. Another problem is
deciding what features belong to what object and which are background or
shadows etc. The human visual system performs these tasks mostly unconsciously
but a computer requires skilful programming and lots of processing power to
approach human performance. Manipulation of data in the form of an image
through several possible techniques. An image is usually interpreted as a two-
dimensional array of brightness values, and is most familiarly represented by such
patterns as those of a photographic print, slide, television screen, or movie screen.
An image can be processed optically or digitally with a computer.
2.1.1 IMAGE:
The word image is also used in the broader sense of any two-dimensional figure
such as a map, a graph, a pie chart, or an abstract painting. In this wider sense,
images can also be rendered manually, such as by drawing, painting, carving,
rendered automatically by printing or computer graphics technology, or developed
by a combination of methods, especially in a pseudo-photograph.
Each pixel has a color. The color is a 32-bit integer. The first eight bits determine
the redness of the pixel, the next eight bits the greenness, the next eight bits the
blueness, and the remaining eight bits the transparency of the pixel.
Fig: BIT Transferred for Red, Green and Blue plane (24bit=8bit red;8-bit
green;8bit blue)
Image file formats are standardized means of organizing and storing images. This
entry is about digital image formats used to store photographic and other images.
Image files are composed of either pixel or vector (geometric) data that are
rasterized to pixels when displayed (with few exceptions) in a vector graphic
display. Including proprietary types, there are hundreds of image file types. The
PNG, JPEG, and GIF formats are most often used to display images on the
Internet.
Fig: Horizontal and Vertical Process
In addition to straight image formats, Metafile formats are portable formats which
can include both raster and vector information. The metafile format is an
intermediate format. Most Windows applications open metafiles and then save
them in their own native format.
IMAGE PROCESSING:
Fi
g: Basics steps of image Processing
Image Acquisition:
Image Enhancement:
Image enhancement is among the simplest and most appealing areas of digital
image processing. Basically, the idea behind enhancement techniques is to bring
out detail that is obscured, or simply to highlight certain features of interesting an
image. A familiar example of enhancement is when we increase the contrast of an
image because “it looks better.” It is important to keep in mind that enhancement is
a very subjective area of image processing.
Fig: Image enhancement process for Gray Scale Image and Colour Image
using Histogram Bits
Image restoration is an area that also deals with improving the appearance of an
image. However, unlike enhancement, which is subjective, image restoration is
objective, in the sense that restoration techniques tend to be based on mathematical
or probabilistic models of image degradation.
Fig: Noise image Image Enhancement
The use of color in image processing is motivated by two principal factors. First,
color is a powerful descriptor that often simplifies object identification and
extraction from a scene. Second, humans can discern thousands of color shades
and intensities, compared to about only two dozen shades of gray. This second
factor is particularly important in manual image analysis.
Segmentation:
Digital image is defined as a two dimensional function f(x, y), where x and y are
spatial (plane) coordinates, and the amplitude of f at any pair of coordinates (x,
y) is called intensity or grey level of the image at that point. The field of digital
image processing refers to processing digital images by means of a digital
computer. The digital image is composed of a finite number of elements, each of
which has a particular location and value. The elements are referred to as picture
elements, image elements, pels, and pixels. Pixel is the term most widely used.
Image Compression
Digital Image compression addresses the problem of reducing the amount of data
required to represent a digital image. The underlying basis of the reduction process
is removal of redundant data. From the mathematical viewpoint, this amounts to
transforming a 2D pixel array into a statically uncorrelated data set. The data
redundancy is not an abstract concept but a mathematically quantifiable entity. If
n1 and n2 denote the number of information-carrying units in two data sets that
represent the same information, the relative data redundancy R D [2] of the first
data set (the one characterized by n1) can be defined as,
1
R D=1−
CR
n1
CR = n 2
Compression ratio:
In the next test series we evaluate the lossy compression efficiency of PGF. One of
the best competitors in this area is for sure JPEG 2000. Since JPEG 2000 has two
different filters, we used the one with the better trade-off between compression
efficiency and runtime. On our machine the 5/3 filter set has a better trade-off than
the other. However, JPEG 2000 has in both cases a remarkable good compression
efficiency for very high compression ratios but also a very poor encoding and
decoding speed. The other competitor is JPEG. JPEG is one of the most popular
image file formats.
It is very fast and has a reasonably good compression efficiency for a wide range
of compression ratios. The drawbacks of JPEG are the missing lossless
compression and the often missing progressive decoding. Fig. 4 depicts the average
rate-distortion behavior for the images in the Kodak test set when fixed (i.e.,
nonprogressive) lossy compression is used. The PSNR of PGF is on average 3%
smaller than the PSNR of JPEG 2000, but 3% better than JPEG.
These results are also qualitative valid for our PGF test set and they are
characteristic for aerial ortho-photos and natural images. Because of the design of
PGF we already know that PGF does not reach the compression efficiency of JPEG
2000. However, we are interested in the trade-off between compression efficiency
and runtime. To report this trade-off we show in Table 4 a comparison between
JPEG 2000 and PGF and in Fig. 5 (on page 8) we show for the same test series as
in Fig. 4 the corresponding average decoding times in relation to compression
ratios.Table 4 contains for seven different compression ratios (mean values over
the compression ratios of the eight images of the Kodak test set) the corresponding
average encoding and decoding times in relation to the average PSNR values. In
case of PGF the encoding time is always slightly longer than the corresponding
decoding time. The reason for that is that the actual encoding phase (cf. Subsection
2.4.2) takes slightly longer than the corresponding decoding phase. For six of
seven ratios the PSNR difference between JPEG 2000 and PGF is within 3% of the
PSNR of JPEG 2000. Only in the first row is the difference larger (21%), but
because a PSNR of 50 corresponds to an almost perfect image quality the large
PSNR difference corresponds with an almost undiscoverable visual difference. The
price they pay in JPEG 2000 for the 3% more PSNR is very high. The creation of a
PGF is five to twenty times faster than the creation of a corresponding JPEG 2000
file, and the decoding of the created PGF is still five to ten times faster than the
decoding of the JPEG 2000 file. This gain in speed is remarkable, especially in
areas where time is more important than quality, maybe for instance in real-time
computation.
In Fig. 5 we see that the price we pay in PGF for the 3% more PSNR than JPEG is
low: for small compression ratios (< 9) decoding in PGF takes two times longer
than JPEG and for higher compression ratios (> 30) it takes only ten percent longer
than JPEG. These test results are characteristic for both natural images and aerial
ortho-photos. Again, in the third test series we only use the ‘Lena’ image. We run
our lossy coder with six different quantization parameters and measure the PSNR
in relation to the resulting compression ratios. The results (ratio: PSNR) are:
In Table 2 it can be seen that in almost all cases the best compression ratio is
obtained by JPEG 2000, followed by PGF, JPEG-LS, and PNG. This result is
different to the result in [SEA+00], where the best performance for a similar test
set has been reported for JPEG-LS. PGF performs between 0.5% (woman) and
21.3% (logo) worse than JPEG 2000. On average it is almost 15% worse. The two
exceptions to the general trend are the ‘compound’ and the ‘logo’ images. Both
images contain for the most part black text on a white background. For this type of
images, JPEG-LS and in particular WinZip and PNG provide much larger
compression ratios. However, in average PNG performs the best, which is also
reported in [SEA+00].
These results show, that as far as lossless compression is concerned, PGF performs
reasonably well on natural and aerial images. In specific types of images such as
‘compound’ and ‘logo’ PGF is outperformed by far in PNG.
Table 3 shows the encoding (enc) and decoding (dec) times (measured in
seconds) for the same algorithms and images as in Table 2. JPEG 2000 and PGF
are both symmetric algorithms, while WinZip, JPEG-LS and in particular PNG are
asymmetric with a clearly shorter decoding than encoding time. JPEG 2000, the
slowest in encoding and decoding, takes more than four times longer than PGF.
This speed gain is due to the simpler coding phase of PGF. JPEG-LS is slightly
slower than PGF during encoding, but slightly faster in decoding images.
WinZip and PNG decode even more faster than JPEG-LS, but their encoding times
are also worse. PGF seems to be the best compromise between encoding and
decoding times.
Our PGF test set clearly shows that PGF in lossless mode is best suited for natural
images and aerial ortho photos. PGF is the only algorithm that encodes the three
Mega Byte large aerial ortho photo in less than second without a real loss of
compression efficiency. For this particular image the efficiency loss is less than
three percent compared to the best. These results should be underlined with our
second test set, the Kodak test set.
Fig. 3 shows the averages of the compression ratios (ratio), encoding (enc),
and decoding (dec) times over all eight images. JPEG 2000 shows in this test set
the best compression efficiency followed by PGF, JPEG-LS, PNG, and WinZip. In
average PGF is eight percent worse than JPEG 2000. The fact that JPEG 2000 has
a better lossless compression ratio than PGF does not surprise,
If both compression efficiency and runtime is important, then PGF is clearly the
best of the tested algorithms for lossless compression of natural images and aerial
ortho photos. In the third test we perform our lossless coder on the ‘Lena’ image.
CLASSIFICATION OF IMAGES:
There are 3 types of images used in Digital Image Processing. They are
Binary Image
Gray Scale Image
Colour Image
BINARY IMAGE:
A binary image is a digital image that has only two possible values for
each pixel. Typically the two colors used for a binary image are black and white
though any two colors can be used. The color used for the object(s) in the image is
the foreground color while the rest of the image is the background color.
Binary images are also called bi-level or two-level. This means that each pixel is
stored as a single bit (0 or 1).This name black and white, monochrome or
monochromatic are often used for this concept, but may also designate any images
that have only one sample per pixel, such as grayscale images
Binary images often arise in digital image processing as masks or as the result of
certain operations such as segmentation, thresholding, and dithering. Some
input/output devices, such as laser printers, fax machines, and bi-level computer
displays, can only handle bi-level images
A grayscale Image is digital image is an image in which the value of each pixel is
a single sample, that is, it carries only intensity information. Images of this sort,
also known as black-and-white, are composed exclusively of shades of gray(0-
255), varying from black(0) at the weakest intensity to white(255) at the strongest.
Grayscale images are distinct from one-bit black-and-white images, which in the
context of computer imaging are images with only the two colors, black,
and white (also called bi-level or binary images). Grayscale images have many
shades of gray in between. Grayscale images are also called monochromatic,
denoting the absence of any chromatic variation.
Grayscale images are often the result of measuring the intensity of light at each
pixel in a single band of the electromagnetic spectrum (e.g. infrared, visible
light, ultraviolet, etc.), and in such cases they are monochromatic proper when only
a given frequency is captured. But also they can be synthesized from a full color
image; see the section about converting to grayscale.
COLOUR IMAGE:
A (digital) color image is a digital image that includes color information for
each pixel. Each pixel has a particular value which determines its appearing color.
This value is qualified by three numbers giving the decomposition of the color in
the three primary colors Red, Green and Blue. Any color visible to human eye can
be represented this way. The decomposition of a color in the three primary colors
is quantified by a number between 0 and 255. For example, white will be coded as
R = 255, G = 255, B = 255; black will be known as (R,G,B) = (0,0,0); and say,
bright pink will be : (255,0,255).
From the above figure, colors are coded on three bytes representing their
decomposition on the three primary colors. It sounds obvious to a mathematician to
immediately interpret colors as vectors in a three dimension space where each axis
stands for one of the primary colors. Therefore we will benefit of most of the
geometric mathematical concepts to deal with our colors, such as norms, scalar
product, projection, rotation or distance.
3.LITERATURE REVIEW :
Reversible data hiding (RDH) algorithms are concerned with concealing data
within images such that the original image can be fully recovered upon the
extraction of hidden data. A substantial interest has grown recently in RDH
algorithms that are based on using dual images in order to increase the embedding
capacity. In this paper, we propose a RDH algorithm that is based on this concept.
Effectively, embedding and extraction of data in the proposed algorithm is
performed in three successive phases. In the first phase, four simple rules are used
to embed about one bit in each pixel in the two images. On the other hand, the
other two phases employ the concept of prediction for embedding secret data bits
but without using any complex predictors. Specifically, these phases use one image
as the prediction of the other image. Performance evaluation of the proposed
algorithm showed its ability to embed around 1.23 bits per pixel with stego image
quality above 48 dB. Moreover, the proposed algorithm is of low computational
complexity and requires no communication of overhead information.
4.EXISTING METHOD
4.1.DRAWBACKS
Data hiding embeds messages into digital multimedia such as image, audio, video
through an imperceptible way, which is mainly used for copyright protection,
integrity authentication, covert communication. Some special signals such as
medical imagery, military imagery and law forensics are so precious that cannot be
damaged. To protect these signals, reversible data hiding (RDH) is developed.
Taking image as example, by RDH after embedding messages into the host image
the generated marked image is visually invariant, and at the same time we can
losslessly restore host image after extracting the embedded messages. RDH is
mainly used for media annotation and integrity authentication, but its application is
now extended by scholars. With RDH we can restore both embedded messages and
host image, this make the host image like storage disk which can be erasable.
However, marked image generated from RDH is hard to resist detection. If we
endow RDH with undetectability, and then such RDH algorithms called reversible
steganography can be applied for convert storage. Besides convert storage, we can
also regard RDH as one tool to do many reversible image operations. To be
detailed, after operating image to the desired target, we can explore the auxiliary
parameters for restoring the original image from the target image, and then
reversibly embed the parameters into the target image to get the reversible operated
image. At the receiver’s side, we extract these auxiliary parameters and the target
image from the reversible operated image, and further restore the original image
from the target image with the extracted parameters.
5.PROPOSED METHOD
Histogram analysis
Image Coding
Embedding
Extraction
Performance analysis
5.1ADVANTAGES
Low distortion
Image Acquisition:
Pre-processing:
Pre-processing is a common name for operations with images at the lowest level of
abstraction -- both input and output are intensity images. The aim of pre-
processing is an improvement of the image data that suppresses unwanted
distortions or enhances some image features important for further processing.
Transformation:
Wavelet transforms are mathematical tools for analyzing data where features vary
over different scales. For signals, features are often frequencies varying over time,
transients, or slowly varying trends. ... Wavelet Toolbox™ to be used with
supports Morlet, Morse, Daubechies, and other wavelets utilized in wavelet
analysis.
steganalysis methods cannot detect it. Embedding capacity is that the key measure
to match the. performance of various data embedding algorithms. In gen- eral
sense, it's the utmost data size which will be securely.The main challenges of
image steganography are imperceptibility of the duvet image and no recoverability
of the key data. To affect these challenges, a modified digital image steganography
technique supported Discrete Wavelet Transform (DWT) is proposed.
Embedding :
Reversible Steganography scheme has the power to embed the key data into a
number image then recover the host image without losing any information when
the key data is extracted. this could be overcome by using some techniques.
Reversible Steganography is additionally referred to as reversible data hiding.
After that extraction steps to get the original data. Main intention of the proposed
model is to supply security. To assure the right extraction of the key message, an
equivalent key's employed by the sender and receiver. Only the receiver who
features a valid key can open the key message. PSNR for Image file M and N are
the rows and columns of the respective input image. R is that the maximum
fluctuation. PSNR for RDH and therefore the proposed method encryption. it's
observed that quality of gray images degrades with this method where as for the
colour images it gives better results. mse = sum(sum(squaredErrorImage)) / (rows
* columns); % Calculate PSNR (Peak Signal to Noise Ratio) from
the MSE according to the formula. PSNR = 10 * log10( 256^2 / mse).
6.CONCLUSION:
Steganography isn't implemented in wider ways but it are often used because the
best security tool. the most problem of today’s world is to secure their confidential
information; the techniques used at the present are either steganography or
steganography, aren't efficient to secure this information. Proposed algorithm
highlight the utilization of steganography with steganography by providing
multilevel security to the confidential data. The proposed algorithm gives better
results for color images in duallevel security. Although the image quality are often
preserved with high PSNR, visual quality can hardly be improved. By accurately
observing the visual quality, the method are often better improved to realize the
more satisfactory results.
7.SOFTWARE DESCRIPTION
Getting Started
INTRODUCTION
What Is MATLAB?
MATLAB has evolved over a period of years with input from many
users. In university environments, it is the standard instructional tool for
introductory and advanced courses in mathematics, engineering, and science. In
industry, MATLAB is the tool of choice for high-productivity research,
development, and analysis.
Development Environment. This is the set of tools and facilities that help you
use MATLAB functions and files. Many of these tools are graphical user
interfaces. It includes the MATLAB desktop and Command Window, a command
history, and browsers for viewing help, the workspace, files, and the search path.
DEVELOPMENT ENVIRONMENT
Introduction
Starting MATLAB
You can change the directory in which MATLAB starts, define startup options
including running a script upon startup, and reduce startup time in some situations.
Quitting MATLAB
To end your MATLAB session, select Exit MATLAB from the File
menu in the desktop, or type quit in the Command Window. To execute specified
functions each time MATLAB quits, such as saving the workspace, you can create
and run a finish.m script.
MATLAB Desktop
The first time MATLAB starts, the desktop appears as shown in the
following illustration, although your Launch Pad may contain different entries.
You can change the way your desktop looks by opening, closing,
moving, and resizing the tools in it. You can also move tools outside of the desktop
or return them back inside the desktop (docking). All the desktop tools provide
common features such as context menus and key
board shortcuts.
Desktop Tools
Workspace Browser
Array Editor
Editor/Debugger
Command Window
Command History
Launch Pad
Help Browser
Command Window
Use the Command Window to enter variables and run functions and
M-files.
Command History
Lines you enter in the Command Window are logged in the
Command History window. In the Command History, you can view previously
used functions, and copy and execute selected lines. To save the input and output
from a MATLAB session to a file, use the diary function.
Launch Pad
Help Browser
Use the Help browser to search and view documentation for all your
Math Works products. The Help browser is a Web browser integrated into the
MATLAB desktop that displays HTML documents.
To open the Help browser, click the help button in the toolbar, or
type help browser in the Command Window. The Help browser consists of two
panes, the Help Navigator, which you use to find information, and the display
pane, where you view the information.
Help Navigator
Product filter - Set the filter to show documentation only for the products you
specify.
Contents tab - View the titles and tables of contents of documentation for your
products.
Index tab - Find specific index entries (selected keywords) in the MathWorks
documentation for your products.
Search tab - Look for a specific phrase in the documentation. To get help for a
specific function, set the Search type to Function Name.
Display Pane
Browse to other pages - Use the arrows at the tops and bottoms of the pages, or
use the back and forward buttons in the toolbar.
Find a term in the page - Type a term in the Find in page field in the toolbar and
click Go.
Other features available in the display pane are: copying
information, evaluating a selection, and viewing Web pages.
MATLAB file operations use the current directory and the search
path as reference points. Any file you want to run must either be in the current
directory or on the search path.
Search Path
Workspace Browser
To view the workspace and information about each variable, use the
Workspace browser, or use the functions who and whos.
Array Editor
Editor/Debugger
Use the Editor/Debugger to create and debug M-files, which are programs you
write to run MATLAB functions. The Editor/Debugger provides a graphical user
interface for basic textediting, as well as for M-file debugging.
You can use any text editor to create M-files, such as Emacs, and
can use preferences (accessible from the desktop File menu) to specify that editor
as the default. If you use another editor, you can still use the MATLAB
Editor/Debugger for debugging, or you can use debugging functions, such as
dbstop, which sets a breakpoint.
If you just need to view the contents of an M-file, you can display it
in the Command Window by using the type function.
MANIPULATING MATRICES
Entering Matrices
The best way for you to get started with MATLAB is to learn how
to handle matrices. Start MATLAB and follow along with each example.
Start by entering Dürer's matrix as a list of its elements. You have only to follow a
few basic conventions:
A=
16 3 2 13
5 10 11 8
9 6 7 12
4 15 14 1
This exactly matches the numbers in the engraving. Once you have entered the
matrix, it is automatically remembered in the MATLAB workspace. You can refer
to it simply as A.
Expressions
Variables
Numbers
Operators
Functions
Variables
Creates a 1-by-1 matrix named num_students and stores the value 25 in its single
element.
Numbers
3 -99 0.0001
1i -3.14159j 3e5i
All numbers are stored internally using the long format specified by
the IEEE floating-point standard. Floating-point numbers have a finite precision of
roughly 16 significant decimal digits and a finite range of roughly 10-308 to
10+308.
Operators
+ Addition
- Subtraction
* Multiplication
/ Division
^ Power
Functions
help elfun
help specfun
help elmat
Some of the functions, like sqrt and sin, are built-in. They are part
of the MATLAB core so they are very efficient, but the computational details are
not readily accessible. Other functions, like gamma and sinh, are implemented in
M-files. You can see the code and even modify it if you want. Several special
functions provide values of useful constants.
Pi 3.14159265...
I Same as i
Inf Infinity
NaN Not-a-number
GUI
Applications that provide GUIs are generally easier to learn and use
since the person using the application does not need to know what commands are
available or how they work. The action that results from a particular user action
can be made clear by the design of the interface.
A FIG-file - contains a complete description of the GUI figure and all of its
children (uicontrols and axes), as well as the values of all object properties.
An M-file - contains the functions that launch and control the GUI and the
Note that the application M-file does not contain the code that lays
out the uicontrols; this information is saved in the FIG-file.
You can elect to have GUIDE generate only the FIG-file and write the application
M-file yourself. Keep in mind that there are no uicontrol creation commands in the
application M-file; the layout information is contained in the FIG-file generated by
the Layout Editor.
Selecting GUIDE Application Options - set both FIG-file and M-file options.
Command-Line Accessibility
When MATLAB creates a graph, the figure and axes are included in
the list of children of their respective parents and their handles are available
through commands such as findobj, set, and get. If you issue another plotting
command, the output is directed to the current figure and axes.
GUIs are also created in figure windows. Generally, you do not
want GUI figures to be available as targets for graphics output, since issuing a
plotting command could direct the output to the GUI figure, resulting in the graph
appearing in the middle of the GUI.
In contrast, if you create a GUI that contains an axes and you want
commands entered in the command window to display in this axes, you should
enable command-line access.
Push Buttons
Sliders
Toggle Buttons
Frames
Radio Buttons
Listboxes
Checkboxes
Popup Menus
Edit Text
Axes
Static Text
Figures
Push Buttons
Properties to Set
String - set this property to the character string you want displayed on the push
button.
Tag - GUIDE uses the Tag property to name the callback subfunction in the
application M-file. Set Tag to a descriptive name (e.g., close_button) before
activating the GUI.
When the user clicks on the push button, its callback executes. Push
buttons do not return a value or maintain a state.
Toggle Buttons
button_state = get(h,'Value');
if button_state == get(h,'Max')
end
Adding an Image to a Push Button or Toggle Button
a(:,:,1) = rand(16,128);
a(:,:,2) = rand(16,128);
a(:,:,3) = rand(16,128);
set(h,'CData',a)
Radio Buttons
Radio buttons have two states - selected and not selected. You can
query and set the state of a radio button through its Value property:
function mutual_exclude(off)
set(off,'Value',0)
The handles of the radio buttons are available from the handles
structure, which contains the handles of all components in the GUI. This structure
is an input argument to all radio button callbacks.
off = [handles.radiobutton2,handles.radiobutton3,handles.radiobutton4];
mutual_exclude(off)
.
After setting the radio buttons to the appropriate state, the callback
can continue with its implementation-specific tasks.
Checkboxes
The Value property indicates the state of the check box by taking on
the value of the Max or Min property (1 and 0 respectively by default):
You can determine the current state of a check box from within its
callback by querying the state of its Value property, as illustrated in the following
example:
function checkbox1_Callback(h,eventdata,handles,varargin)
if (get(h,'Value') == get(h,'Max'))
end
Edit Text
Edit text controls are fields that enable users to enter or modify text
strings. Use edit text when you want text as input. The String property contains the
text entered by the user.
To obtain the string typed by the user, get the String property in the
callback.
user_string = get(h,'string');
You can use the following code in the edit text callback. It gets the
value of the String property and converts it to a double. It then checks if the
converted value is NaN, indicating the user entered a non-numeric character
(isnan) and displays an error dialog (errordlg).
function edittext1_Callback(h,eventdata,handles,varargin)
user_entry = str2double(get(h,'string'));
if isnan(user_entry)
end
Static Text
Static text controls displays lines of text. Static text is typically used
to label other controls, provide directions to the user, or indicate values associated
with a slider. Users cannot change static text interactively and there is no way to
invoke the callback routine associated with it.
Frames
Frames are opaque. If you add a frame after adding components that
you want to be positioned within the frame, you need to bring forward those
components. Use the Bring to Front and Send to Back operations in the Layout
menu for this purpose.
List Boxes
List boxes display a list of items and enable users to select one or
more items.
The String property contains the list of strings displayed in the list
box. The first item in the list has an index of 1.
The Value property contains the index into the list of strings that
correspond to the selected item. If the user selects multiple items, then Value is a
vector of indices.
By default, the first item in the list is highlighted when the list box
is first displayed. If you do not want any item highlighted, then set the Value
property to empty, [].
The values of the Min and Max properties determine whether users
can make single or multiple selections:
If Max - Min > 1, then list boxes allow multiple item selection.
If Max - Min <= 1, then list boxes do not allow multiple item selection.
Selection Type
MATLAB evaluates the list box's callback after the mouse button is
released or a keypress event (including arrow keys) that changes the Value
property (i.e., any time the user clicks on an item, but not when clicking on the list
box scrollbar). This means the callback is executed after the first click of a double-
click on a single item or when the user is making multiple selections.
Set the list box Callback property to the empty string ('') and remove
the callback subfunction from the application M-file. Leave the callback
subfunction stub in the application M-file so that no code executes when users
click on list box items.
The first choice is best if you are sure you will not use the list box
callback and you want to minimize the size and efficiency of the application M-
file. However, if you think you may want to define a callback for the list box at
some time, it is simpler to leave the callback stub in the M-file.
Popup Menus
Popup menus open to display a list of choices when users press the
arrow.
The String property contains the list of string displayed in the popup
menu. The Value property contains the index into the list of strings that correspond
to the selected item.
When not open, a popup menu displays the current choice, which is
determined by the index contained in the Value property. The first item in the list
has an index of 1.
Popup menus are useful when you want to provide users with a
number of mutually exclusive choices, but do not want to take up the amount of
space that a series of radio buttons requires.
This callback checks the index of the selected item and uses a
switch statement to take action based on the value. If the contents of the popup
menu is fixed, then you can use this approach.
val = get(h,'Value');
switch val
case 1
case 2
% etc.
This callback obtains the actual string selected in the popup menu.
It uses the value to index into the list of strings. This approach may be useful if
your program dynamically loads the contents of the popup menu based on user
action and you need to obtain the selected string. Note that it is necessary to
convert the value returned by the String property from a cell array to a string.
val = get(h,'Value');
string_list = get(h,'String');
% etc.
off - The control is disabled and its label (set by the string property) is
grayed out.
inactive - The control is disabled, but its label is not grayed out.
Axes
Axes enable your GUI to display graphics (e.g., graphs and images).
Like all graphics objects, axes have properties that you can set to control many
aspects of its behavior and appearance. See Axes Properties for general
information on axes objects.
Axes Callbacks
axes(handles.axes1)
makes the axes whose Tag property is axes1 the current axes, and therefore the
target for plotting commands. You can switch the current axes whenever you want
to target a different axes. See GUI with Multiple Axes for and example that uses
two axes.
Figure
Figures are the windows that contain the GUI you design with the
Layout Editor. See the description of figure properties for information on what
figure characteristics you can control.
8.REFERENCES:
[4] N. Kumar and S. Agrawal, "An efficient and effective lossless symmetric key
steganography algorithm for an image," 2014 IEEE International Conference on
Advances in Engineering & Technology Research (ICAETR - 2014), Unnao, 2014,
pp. 1-5. doi: 10.1109/ICAETR.2014.7012788
[6] Fatiha Djebbar and Beghdad Ayad and Karim Abed Meraim and Habib
Hamam - “Comparative Study of Digital Audio Steganography Techniques”
[7] R.Balaji, G. Naveen - “Secure data transmission using video steganography”