Keywords Secret data, Host data, DWT, LSB substitution.

Similar documents
Analysis of Secure Text Embedding using Steganography

ScienceDirect. A Novel DWT based Image Securing Method using Steganography

IMAGE STEGANOGRAPHY USING MODIFIED KEKRE ALGORITHM

An Enhanced Least Significant Bit Steganography Technique

Modified Skin Tone Image Hiding Algorithm for Steganographic Applications

International Journal of Advance Engineering and Research Development IMAGE BASED STEGANOGRAPHY REVIEW OF LSB AND HASH-LSB TECHNIQUES

A Novel Image Steganography Based on Contourlet Transform and Hill Cipher

An Implementation of LSB Steganography Using DWT Technique

Exploration of Least Significant Bit Based Watermarking and Its Robustness against Salt and Pepper Noise

Digital Image Watermarking using MSLDIP (Modified Substitute Last Digit in Pixel)

A New Image Steganography Depending On Reference & LSB

FPGA implementation of LSB Steganography method

A Proposed Technique For Hiding Data Into Video Files

Steganography using LSB bit Substitution for data hiding

An Integrated Image Steganography System. with Improved Image Quality

Block Wise Data Hiding with Auxilliary Matrix

FPGA implementation of DWT for Audio Watermarking Application

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

A SECURE IMAGE STEGANOGRAPHY USING LEAST SIGNIFICANT BIT TECHNIQUE

AN IMPROVED LSB METHOD OF STEGANOGRAPHY WITH JPEG COLORED IMAGE

ISSN (PRINT): , (ONLINE): , VOLUME-4, ISSUE-11,

GNE College, Ludhiana, Punjab, India

Introduction to More Advanced Steganography. John Ortiz. Crucial Security Inc. San Antonio

Basic concepts of Digital Watermarking. Prof. Mehul S Raval

Implementation of Effective, Robust and BPCS Data Embedding using LSB innovative Steganography Method

Journal of mathematics and computer science 11 (2014),

Embedding and Extracting Two Separate Images Signal in Salt & Pepper Noises in Digital Images based on Watermarking

Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

Keywords-Image Enhancement, Image Negation, Histogram Equalization, DWT, BPHE.

Secure Image Steganography using N-Queen Puzzle and its Comparison with LSB Technique

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

Improved RGB -LSB Steganography Using Secret Key Ankita Gangwar 1, Vishal shrivastava 2

Concealing Data for Secure Transmission and Storage

Dual Transform Color Image Steganography Method

Sterilization of Stego-images through Histogram Normalization

An Overview of Image Steganography Techniques

FPGA Implementation of Secured Image STEGNOGRAPHY based on VIGENERE CIPHER and X BOX Mapping Techniques

Transform Domain Technique in Image Steganography for Hiding Secret Information

Digital Watermarking Using Homogeneity in Image

International Journal of Advance Research in Computer Science and Management Studies

Exploiting the RGB Intensity Values to Implement a Novel Dynamic Steganography Scheme

VARIABLE-RATE STEGANOGRAPHY USING RGB STEGO- IMAGES

Keywords Arnold transforms; chaotic logistic mapping; discrete wavelet transform; encryption; mean error.

Image Compression and Decompression Technique Based on Block Truncation Coding (BTC) And Perform Data Hiding Mechanism in Decompressed Image

DWT BASED AUDIO WATERMARKING USING ENERGY COMPARISON

A Novel (2,n) Secret Image Sharing Scheme

Covert communication of grayscale images within color images Comunicación encubierta de imágenes a escala de grises en imágenes a color

Hiding And Encrypting Binary Images Using A Different Approach

Dynamic Collage Steganography on Images

<Simple LSB Steganography and LSB Steganalysis of BMP Images>

Coding and Analysis of Cracked Road Image Using Radon Transform and Turbo codes

Effect of Embedding Multiple Watermarks in Color Image against Cropping and Salt and Pepper Noise Attacks

Comparative Analysis of Hybrid Algorithms in Information Hiding

A Novel Approach for Hiding Huge Data in Image

Colored Digital Image Watermarking using the Wavelet Technique

A Study on Steganography to Hide Secret Message inside an Image

Steganography & Steganalysis of Images. Mr C Rafferty Msc Comms Sys Theory 2005

Hiding Image in Image by Five Modulus Method for Image Steganography

ENHANCED SECURITY SYSTEM USING SYMMETRIC ENCRYPTION AND VISUAL CRYPTOGRAPHY

Image Quality Estimation of Tree Based DWT Digital Watermarks

Investigation of Various Image Steganography Techniques in Spatial Domain

HSI Color Space Conversion Steganography using Elliptic Curve

Performance Improving LSB Audio Steganography Technique

A Survey of Substantial Digital Image Watermarking Techniques

AN ERROR LIMITED AREA EFFICIENT TRUNCATED MULTIPLIER FOR IMAGE COMPRESSION

A Secure Robust Gray Scale Image Steganography Using Image Segmentation

THE STATISTICAL ANALYSIS OF AUDIO WATERMARKING USING THE DISCRETE WAVELETS TRANSFORM AND SINGULAR VALUE DECOMPOSITION

A Study on Image Steganography Approaches in Digital Images

HYBRID MATRIX CODING AND ERROR-CORRECTION CODING SCHEME FOR REVERSIBLE DATA HIDING IN BINARY VQ INDEX CODESTREAM

DENOISING DIGITAL IMAGE USING WAVELET TRANSFORM AND MEAN FILTERING

REVERSIBLE MEDICAL IMAGE WATERMARKING TECHNIQUE USING HISTOGRAM SHIFTING

Detection of Steganography using Metadata in Jpeg Files

A Secure Image Encryption Algorithm Based on Hill Cipher System

Data Hiding Using LSB with QR Code Data Pattern Image

Tampering Detection Algorithms: A Comparative Study

Quantitative Analysis of Noise Suppression Methods of Optical Coherence Tomography (OCT) Images

Effective and Secure Method of Color Image Steganography

Data Hiding Algorithm for Images Using Discrete Wavelet Transform and Arnold Transform

An Efficient Data Security System Using Reserve Room Approach on Digital Images for Secret Sharing

Reversible data hiding based on histogram modification using S-type and Hilbert curve scanning

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

A New Secure Image Steganography Using Lsb And Spiht Based Compression Method M.J.Thenmozhi 1, Dr.T.Menakadevi 2

FACE RECOGNITION USING NEURAL NETWORKS

Enhance Image using Dynamic Histogram and Data Hiding Technique

Image Steganography with Cryptography using Multiple Key Patterns

Digital Image Sharing using Encryption Processes

arxiv: v1 [cs.mm] 31 Mar 2014

IMPROVED LSB BASED IMAGE STEGANOGRAPHY USING RUN LENGTH ENCODING AND RANDOM INSERTION TECHNIQUE FOR COLOR IMAGES

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

Design and Testing of DWT based Image Fusion System using MATLAB Simulink

Sunil Karforma Associate Professor Dept. of Computer Science The University of Burdwan Burdwan, West Bengal, India

Implementation Of Steganography For Business Documents Security Using Discrete Wavelet Transform Method

International Journal of Advance Engineering and Research Development CONTRAST ENHANCEMENT OF IMAGES USING IMAGE FUSION BASED ON LAPLACIAN PYRAMID

Robust watermarking based on DWT SVD

Image Smoothening and Sharpening using Frequency Domain Filtering Technique

Wavelets Transform Based Data Hiding Technique for Stegnography

APPLYING EDGE INFORMATION IN YCbCr COLOR SPACE ON THE IMAGE WATERMARKING

Keywords Fuzzy Logic, ANN, Histogram Equalization, Spatial Averaging, High Boost filtering, MSE, RMSE, SNR, PSNR.

Improvement in DCT and DWT Image Compression Techniques Using Filters

IJESRT: 7(10), October, 2018 ISSN:

Transcription:

Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance Evaluation of LSB Substitution and DWT Method for Steganography Gauresh Vanjare, Saylee Gharge Electronics and Telecommunication & V.E.S.I.T India Abstract Data secrecy has become a main concern in the recent period. Many new techniques are employed to hide the secret data in some or the other form. This method of hiding the data into another form is called as Steganography. Likely, an old term in Ancient Greek, Steganography is derived from steganos meaning concealed and graphein meaning writing. This paper emphasizes on the two major techniques employed in Steganography Discrete Wavelet Transform and LSB Substitution. Keywords Secret data, Host data, DWT, LSB substitution. I. INTRODUCTION Traditionally, some people used a secret way to hide data from open view. This secret data was hidden into an image with some kind of invisible ink which was visible under strong sunlight or through some lenses. This method of data hiding became familiar in the 18 th century. Some among them were Cartographers who used these techniques to hide a treasure on a map. This most valued and significant technique which added security aspect is known as Steganography. But over a period of 8-12 years there has been a significant transition from Analog data to digitally transformed data. A digital data can be processed since it is encoded in two digits. With the growth of internet, prominent advancements took place in the internet banking and other online transactions.hence a need of more secure and sophisticated methodology to protect the data emerged. In the digital world, various schemes are adopted to hide data. The commonly used among those are Steganography and Watermarking. Steganography is applying some cover image to protect data from Intruder [1]. On the other hand Watermarking protects the copyright of the owner by embedding a signature into it. This technique is employed to digital albums, documents, records etc [1][2]. Steganography system must follow three main conditions: (1) Invisibility: The secret data should not be visible with naked eye view. (2) Capacity: A cover image must hold more embedded secret data, this will increase the image size to a greater extent but still huge data is embedded. Consequently image quality will degrade to a greater extent. So a trade-off between these two factors must be maintained [3].(3) Robustness: The Stego image must hold secret data even after some noise is added to it. These three condition holds the reliability and prevention against most popular attacks like Steganalysis [4]. Steganography incorporates two major algorithms, firstly embedding algorithm [5] and other one is extracting the Secret image. Technical names used for images are Host image which is visible to everyone.secret image which is to be hidden.stego image containing visible host image and hidden Secret image.extracted Secret image is the data retrieved from a Stego image. Steganography is divided into two main categories: 1. Spatial Domain and 2. Frequency Domain. Spatial Domain includes Least Significant Bit Substitution, DC Coefficient LSB and Frequency Domain includes Discrete Wavelet Transform, Discrete Cosine Transform etc. Each category has its own advantages. LSB substitution has more embedding capacity while DWT has more robustness.different parameters like Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are used to measure the efficiency of the Stego image. The following paper is organized as follows: Section 2 provides a brief idea of prior related work, section 3 gives the algorithm and general information of LSB Substitution method. In section 4, algorithm and selection criteria of DWT are discussed. Section 5 gives quality parameters. Section 6 demonstrates analysis and results of different images under test. Section 7 briefs the best applicable technique for different class of images. II. RELATED KNOWLEDGE A significant work was carried on LSB method by SHIUH-JENG WANG [6].In Fig 1, Wang demonstrated a technique that increasedthe security of an image by first embedding the secret image C into Host Image H and the Stego Image Z 2015, IJARCSSE All Rights Reserved Page 699

was obtained by multiplying C with asubstitution matrix. Here k is the length of the LSB bits. The image C is then decomposed to get C which is then randomized to increase security and results into C. R contains the LSB bits of H. C is then subjected to N*N substitution matrix which increases the embedding capacity.c x is the optimal image with minimum MSE. The k LSB bits of H are replaced with C x to get the Stego image. Kekre [5] made the use of DCT wavelet transform for hiding image. This method uses middle frequency coefficients for embedding secret data. The use of middle frequency coefficients proved to be robust for lossy Image compression Khaled, Loukhaoukha [7] used DWT and single value decomposition. This technique provides uncorrelated coefficients. DWT decomposes an image into 4 major sub bands which are described in the section 4. Fig 1. Shiuh-Jeng Wang Model III. LEAST SIGNIFICANT BIT SUBSTITUTION LSB substitution is the most adapted method to increase capacity by reducing the quality of image.a digital image is represented by two digits that is 1 or 0. The concept of LSB is associated with the bit position in an image. The lower (rightmost) bits in an 8 bit grey level plane of host image carries very less significant information. While the most significant bits (leftmost) carries the most of the information. LSB substitution makes use of this bit position and smartly replaces the least significant bits of host image with most significant bits of secret image. The mathematical representation of LSB method can be given as [1]: x i =x i x i mod (2 k ) +m i (1) In equation (1), x i denotes I th pixel values of Stego image. m i is the decimal value of the I th block in secret image. k is the number of LSB substituted. On the other hand, the mathematical representation of extracted image is given as[1] m i = x i mod 2 k (2) Thus a simple bit shift that is permutation gives straight forward results. As seen from Fig 2 and Fig 3, the host and the secret image need to be of same dimension for carrying out LSB method. The value of n decides the number of bits t be substituted. 2015, IJARCSSE All Rights Reserved Page 700

Fig 2. Flowchart for embedding the data using LSB substitution Fig 3. Flowchart for extracting the data using LSB substitution IV. DISCRETE WAVELET TRASFORM: Transformation is generally used to uncorrelate the wavelet coefficient. It converts an image from spatial domain to frequency domain. The mathematical representation of wavelet transform is given by formula [8]: F(a,b) = f x Ψ a,b (x) dx (3) Wavelet transform is a convenient means to split an image into 4 frequency bands. Fig 4. Frequency bands in DWT 2015, IJARCSSE All Rights Reserved Page 701

As seen from the Fig 4, LL band is low frequency band containing most of the information of the secret image. Steganography makes use of this band for altering or modifying data to make it undetectable with human eye.thus more decomposition levels are applied to an image to make it look like an unaltered image. The embedding algorithm describes 3 level of decomposition to more approximate details of an image. Fig 5. Embedding algorithm for LSB substitution with 3 level of DWT Three level decomposition is employed as shown in Fig 5. to get more detailed image that is LL band. Fig 6. Extracting algorithm for DWT method 2015, IJARCSSE All Rights Reserved Page 702

V. QUALITY PARAMETERS The two factors which describes the quality of Steganographed image are. MEAN SQUARED ERROR (MSE): It is a factor to indicate difference in the error. I is grey level image and K is noisy approximation MSE = 1 m 1 n 1 I i, j K i, j 2 m.n i=0 j =0 (4) PEAK SIGNAL TO NOISE RATIO (PSNR): It states the fidelity of the system and gives the quality of reconstructed data. It is mathematically represented as: PSNR =10.log 10 ( MAX I 2 MSE ) =20.log 10 ( MAX I MSE ) =20.log 10 (MAX I ) - 20.log 10 (MSE) (5) MAX i is maximum pixel value VI. RESULTS LSB Substitution and DWT was performed on different class of images to get a visual indication of best suitable technique for different images. Host image used was for both the cases. Results using LSB Substitution method: HUMAN Table I Psnr And Mse Values Of Image Of Different Class Using Lsb Method Class Secret Image PSNR MSE girl.jpg 42.2442 3.0323 mona.jpg 44.2542 5.0099 man.jpg 43.0344 3.0955 ANIMALS 47.3439 3.3304 elephnt.jpg 44.0333 4.4655 monkey.jpg OTHERS 45.5534 5.5555 fruits.jpg 44.4344 4.6533 car.jpg 2015, IJARCSSE All Rights Reserved Page 703

43.4577 5.4712 boat.jpg LSB Substitution gives high level of embedding but at the cost of image quality. If more bits are stuffed to hide the data then the secret image traces are visible on the cover image. LSB Substitution is suitable for dark cover image and secret image, where the bits substituted can be hardly visible to a human eye. In our case elephant.jpg is converted into grayscale image gives a PSNR of 47.3439. This high value indicates good quality of reconstructed image. LSB Substitution is apt for ANIMAL CLASS, OTHERS CLASS images. Results using DWT method: Table II Psnr And Mse Values Of Image Of Different Class Using Dwt Method Class Secret Image PSNR MSE HUMAN 48.2332 5.0323 girl.jpg mona.jpg 46.2322 4.0099 man.jpg 49.0322 4.0955 ANIMALS 45.3439 5.0004 elephant.jpg OTHERS monkey.jpg 43.04443 4.5655 fruits.jpg 45.55454 4.0055 car.jpg 43.4454 5.0033 boat.jpg 42.3455 5.6711 DWT method decomposes the entire image. It transforms the image rather than manipulating bits. This method produces a irreversible image in terms of quality, image size and brightness and contrast ratio. DWT method gives highest image quality for any light toned image.dwt is suitable for HUMAN CLASS. 2015, IJARCSSE All Rights Reserved Page 704

Table III comparision of lsb and dwt Sr. Host Image Secret Image Stego(LSB) Stego(DWT) Extracted PSNR PSNR N0 [4 Bits] Image (LSB) (DWT) I 46.2333 50.2324 lena.jpg II 49.3524 46.1525 parrot.jpg III 46.2425 42.2435 duck.jpg IV 48.3226 46.8276 plane.jpg TABLE III gives a comparative study of LSB substitution and DWT method. Four different class images were considered. The cover image used for all the cases was. In the case of DWT, lena.jpg gave high PSNR value as compared to other images. On the other hand parrot.jpg, duck.jpg, plane.jpg gave high PSNR using LSB method. This states that a HUMAN CLASS image which has less variation in luminance will be embedded perfectly inside the secret image. LSB substitution method gives high embedding for the images containing variation in the brightness. VII. CONCLUSION In this paper, some commonly known steganography techniques were implemented. LSB substitution and DWT are widely used for the same. Each of the method has its own advantage. LSB method embedded about 60% of data bits and retained the same size of the image because only the pixels values were shuffled. In DWT method, the given data is decomposed to get uncorrelated data which changes the image composition. This operation affects the entire image and hence the reconstructed image is smaller in size. DWT method has high privacy and hides secret image very well. REFERENCES [1] Manupriya, Tarun Kumar, Analysis of Wavelets with Watermarking through Wavelet Transformation, International Journal of Computer Applications (0975 8887) Volume 96 No.22, June 2014. [2] Po-Yueh Chen and Hung-JuLin, A DWT Based Approach for Image Steganography, International Journal of Applied Science and Engineering 2006. 4, 3: 275-290 [3] Cheng-Hsing Yang and Shiuh-Jeng Wang, Transforming LSB substitution for image-based Steganography in matching algorithms, Journal of Information Science and Engineering 26, 1199-1212 (2010). [4] Vijay Kumar Sharma And Vishal Shrivastava, A Steganography algorithm for hiding image inimage By Improved LSB Substitution By Minimize detection, Journal of Theoretical and Applied Information Technology 15th February 2012. Vol. 36 No.1 [5] H. B. Kekre, TanujaSarode, ShachiNatu 2014, Robust Watermarking Scheme using Column DCT Wavelet Transform under Various Attacks, International Journal on Computer Science and Engineering (IJCSE), 2014. [6] R. Z. Wang, C. F. Lin, and J. C. Lin, Image hiding by optimal LSB substitution and genetic algorithm, Pattern Recognition, Vol. 34, 2001, pp. 671-683. [7] Khaled Loukhaoukha, Image Watermarking Algorithm Based on Multi objective Ant Colony Optimization and Singular Value Decomposition in Wavelet Domain, Hindawi Publishing Corporation Journal of Optimization Volume 2013. [8] Barnali Gupta and Prof. Samir K., A DWT Method for Image Steganography, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 6, June 2 2013. 2015, IJARCSSE All Rights Reserved Page 705