SlideShare uma empresa Scribd logo
1 de 36
Skin Tone Based Image
Steganography
Girish Ram M
R7121
What is Steganography??
Steganography is the ART OF HIDING the secret and
confidentional data in another transmission medium
to achieve secret communication.
Hiding of data in Image is called
Image Steganography.
Why do we need Steganography??
Internet serves as an important role for data transmission and
sharing.
It is a worldwide and publicized medium, some confidential
data might be stolen, copied, modified, or destroyed
Security problems become an essential issue.
Encryption is a well-know procedure for secured data
transmission
Why not Encryption??
Encryption is the process of encoding messages (or
information) into a form that cannot be easily understood by
unauthorized people.
Disadv of encryption: They make the secret messages
unreadable and unnatural, These unnatural messages usually
attract some unintended observer’s attention.
Therefore, Digital Steganography is a new
security approach for the transmission of confidential data
Encryption
Steganography
Original image
Secret data
Stegano image
Comparison b/w Steganography &
Watermarking
Both are branches of data hiding.
Watermarking is the technique of embedding digital
marks inside a container(image) so that there is a logical
way of extracting the data embedded.
Here no harming of container.
Steganography uses the cover file to deliver its secret
message while watermarking considers the cover file as
the important data that is to be preserved.
Steganography is used for secret communication while
watermarking is used for authentication.
Fig1. Trade off b/w embedding capacity, Robustness and undetectability
in Data hiding
Embedding Capacity
Naive steganographic
technique
Secure steganographic
technique
Digital Watermarking
Undetectability Robustness
Steganography pay attention to the degree of invisibility
while Watermarking pay most of its attribute to the
robustness of the message and its ability to withstand
attacks of removal.
Existing Methods for Image
Steganography
LSB(Least Significant Bit) Substitution based.
Transform domain based.
Adaptive method.
Proposed Method
Biometrics based steganography using DWT(Discrete
Wavelet Transform)
Biometric feature used is Skin tone region of images.
In this method secret data is embedded within skin region.
Skin region are not sensitive to HVS(Human Visual System).
Overview of method
First: Skin tone detection is performed on input image
using HSV (Hue, saturation, value).
Second: Cover image is transformed in frequency domain
using Haar-DWT.
Payload number calculated.
Finally Secret message is embedded in one of the high
frequency sub-band by tracing skin pixels in that band.
Embedding steps are applied to 2 cases:
With Cropping
Without Cropping
Both cases uses different embedding algorithm.
With Cropping
First cropping on input image is performed and only in
cropped region data hiding is performed.
Cropped region works as a key at decoding side.
More Secure.
Without Cropping
Data is embedded in whole Skin region image.
Embedding algorithm attempts to preserve histogram of
DWT coefficients after embedding.
Skin Tone Detection Using
HSV
Aim: Discriminate b/w skin & non-skin pixels.
Transforms a given pixel into an appropriate color space.
Uses a skin classifier to label the pixel whether it is a skin
or a non-skin pixel.
Skin detection algo produces a mask – black and white.
White pixel = 1 Skin pixel.
Black pixel = 0  Non-Skin pixel.
How to decide weather a pixel is skin or
not skin?
RGB matrix of the given color image is converted into
different color spaces to yield distinguishable regions of
skin or near skin tone.
Mainly two kinds of color spaces are available HSV (Hue,
Saturation and Value) and YCbCr spaces.
It is experimentally found that the distribution of human
skin color constantly resides in a certain range within the
color space.
Here HSV color space is chosen.
Cont’d..
RGB image is converted into HSV color space.
In HSV, responsible values for skin detection are Hue &
Saturation.
Extract Hue & Saturatn dimensions into separate new variables
(H & S).
For Skin detection threshold is chosen as
[H1, S1] & [H2,S2].
Sobottaka & Pitas defined a face localization based on HSV.
They found that the threshold range of human flesh as:
Smin= 0.23, Smax =0.68, Hmin =0° & Hmax=50°.
HSV Color model
Pure HueWhite Tints
 Hue at 0o is red
 Hue at 120o is green
 Hue at 240o is blue
YCbCr Model
Black
Shade
Tones
Converted to HSVOriginal Image
DWT and Haar-DWT
This is one of the Frequency domain in which
Steganography can be implemented.
In this work DWT better than DCT.
Haar-DWT is simplest form of DWT.
DWT splits component into numerous frequency sub
bands as:
LL – Horizontally and vertically low pass
LH – Horizontally low pass and vertically high pass
HL - Horizontally high pass and vertically low pass
HH - Horizontally and vertically high pass
Human eyes are more sensitive to the low frequency part
(LL sub-band).
Hence secret message in hidden other 3 parts.
Haar-DWT
 Adv: High Computation Speed, Simplicity.
 Performs row and column transformation of Image matrix.
Procedure
1.Haar DWT of an array
2.Using Matrix Multiplication:
 If A is matrix on which we want to perform Haar-DWT, row
transform is performed using
Q=A×P , where P=
 O/P of row transform becomes I/P at column transform.
 Column transformation is obtained using
R= P’× Q where P’ is transpose of P.
 Matrix P performs averaging and differencing operation.
 Result is four sub-bands.
1 0 1 0
1 0 -1 0
0 1 0 1
0 1 0 -1
Encoding
Suppose C is original 24-bit color cover image of M×N
size.
C= {xij, yij, zij |1<=i<=M, 1<= j . N, xij, yij, zij in {0, 1,..,
255}}
Let S is secret data. Here secret data considered is binary
image of size a×b.
Two cases of Encoding process:
 With cropping
 Without cropping
With Cropping
Let size of cropped image is Mc×Nc where Mc≤M and
Nc≤N and Mc=Nc. i.e. Cropped region must be exact square
as we have to apply DWT later.
Step1:Apply skin tone detection on cover image. This will
produce mask image that contains skin and non skin pixels.
Step2: Cropping is done interactively on image (Mc×Nc).
Note: Cropped area must be an exact square and
cropped area should contain skin region such as face,
hand etc.
 Cropped rectangle will act as key at receiving side.
Step3: Apply DWT to cropped area.
This yields 4 sub-bands denoted as HLL, HHL,HLH,HHH
Payload of image is determined based on nos of skin
pixels present in one of high frequency sub-band.
Embedding in LL sub-band affects image quality
greatly.
Step4: Embedding in high frequency HH sub-band is done
only in skin pixels. Skin pixels are traced using skin mask
detected earlier secret data is embedded
Embedding is performed in G-plane and B-plane of RBG
but strictly not in R-plane as contribution of R plane in
skin color is more.
Embedding is done as per raster-scan order.
Step5: Perform IDWT to combine 4 sub-bands.
Step6: A cropped stego image of size Mc×Nc is obtained.
Merge the cropped stego image with original image to get
the stego image of size M×N.
For merging coefficients of first and last pixels of cropped
area in original image is required so that R is calculated.
Finally, Stego image is ready for secret communications.
Flowchart of With Cropping case of
Embedding Process
Without Cropping
There is a major difference is actual embedding algorithm.
In this embedding algorithm, Data is hidden such that the
histogram of the cover image shouldn’t get modified.
Step1:Apply skin tone detection.
Step2: Separate R, G, B planes, Apply DWT to B plane.
Skin pixels from HH sub-band are retrieved and stored in
one matrix.
Step3: Apply embedding algorithm to retrieved matrix.
Here, start from first pixel and using pseudorandom
sequence its corresponding pixel for pair is found.
To create a pseudo random sequence Lehmer’s
Congruential generator is used. It generates non
overlapping random sequence. Lehmer invented the
multiplicative congruential algorithm - which is the basis
for many of the random number generators today.
Lehmer's generators involve 3 integer parameters a, c, and
m, and an initial value x0, called the seed
xk+1 = axk + c mod m
Pairs are formed using this equation.
Embedding algorithm
• Input- matrix of only skin pixels, let it is S and secret
• message bits of size M
• Output- Modified matrix of only skin pixels
• Begin
• 1] Select non-overlapping, random pair from S. Let it be p1,
p2.
• If count (message bits)=M then
• goto End
• Else
• goto step 2
• 2] if p1=p2 then
• goto step 1 (choose other pair)
 3] if p1‚ p2 then
 goto step 4.
 4] if message bit =0 then
 if p1>p2 then
 swap (p1,p2).
 Choose next message bit.
 Else Choose next message bit.
 goto step 1.
 5] if message bit=1 then
 if p1<p2 then
 swap(p1,p2)
 Choose next message bit.
 else Choose next message bit.
 goto step 1.
 End
Step4: This modified matrix of only skin pixels is restored
in HH sub-band.
Step5: Apply IDWT to merge all the sub-bands.
Finally, Stego image is ready.
Decoding
Case 1- With Cropping
In this case we must need a value of cropped area to retrieve
data.
Suppose cropped area value is stored in ‘rect’ variable.
‘rect’ will act as a key at decoder side.
By tracing skin pixels in HHH sub-band of DWT secret data
is retrieved.
Case 2- Without Cropping
In this case extraction of secret data is done without cropping.
Decoding requires finding skin pixel pairs that are used for
embedding.
These pixel pairs are found by generating non-overlapping,
random sequence using Lehmer’s Congruential generator.
 Once correct pixel pairs are found, based on their values
either one or zero of secret data is decided.
Flowchart of Decoding Process
Performance Measure
Peak signal to noise ratio (PSNR) is used to evaluate
quality of stego image after embedding the secret message.
PSNR is defined as:
Xij and Yij represents pixel values of original cover image
and stego image respectively.
PSNR usually adopts dB value for quality judgement.
The larger PSNR is, higher the image quality.
On the contrary smaller dB value means there is a more
distortion.
PSNR values falling below 30dB indicate fairly a low
quality. However, high quality strives for 40dB or more.
Capacity and PSNR of 4 final stego
images in proposed method.
CASE A- WITHOUT CROPPING
CASE B- WITH CROPPING
Conclusion
Digital Steganography is a fascinating scientific area which
falls under the umbrella of security systems.
Skin Tone based Steganography is presented that uses skin
region of images in DWT domain for embedding secret data.
Two cases for data embedding are considered, with cropping
and without cropping.
According to performance measure results, proposed
approach provides fine image quality. Since PSNR of all
images are above 40db.
thank you..
Questions?

Mais conteúdo relacionado

Mais procurados

STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESLovely Mnadal
 
Image Steganography
Image SteganographyImage Steganography
Image SteganographyAnkit Gupta
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganographyAslesha Niki
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSBSreelekshmi Sree
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA AlgorithmRitu Agarwal
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Praneeta Dehare
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...Journal For Research
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 MethodKaushik Chakraborty
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image SteganographyEditor IJCATR
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesEswar Publications
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis pptOm Vishnoi
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 

Mais procurados (20)

STEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDESSTEGANOGRAPHY PRESENTATION SLIDES
STEGANOGRAPHY PRESENTATION SLIDES
 
Technical seminar ppt
Technical seminar pptTechnical seminar ppt
Technical seminar ppt
 
Image Steganography
Image SteganographyImage Steganography
Image Steganography
 
Modifications in lsb based steganography
Modifications in lsb based steganographyModifications in lsb based steganography
Modifications in lsb based steganography
 
Image Steganography using LSB
Image Steganography using LSBImage Steganography using LSB
Image Steganography using LSB
 
Steganography
SteganographySteganography
Steganography
 
Steganography with RSA Algorithm
Steganography with RSA AlgorithmSteganography with RSA Algorithm
Steganography with RSA Algorithm
 
Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...Implementation of Image Steganography in Image by using FMM nested with LSB S...
Implementation of Image Steganography in Image by using FMM nested with LSB S...
 
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
DATA HIDING BY IMAGE STEGANOGRAPHY APPLING DNA SEQUENCE ARITHMETIC & LSB INSE...
 
Image Steganography Using M16 Method
Image Steganography Using M16 MethodImage Steganography Using M16 Method
Image Steganography Using M16 Method
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
Steganography
SteganographySteganography
Steganography
 
Comparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography TechniquesComparative Study of Spatial Domain Image Steganography Techniques
Comparative Study of Spatial Domain Image Steganography Techniques
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Art of Steganography
Art of SteganographyArt of Steganography
Art of Steganography
 
Steganography
Steganography Steganography
Steganography
 
Steganalysis ppt
Steganalysis pptSteganalysis ppt
Steganalysis ppt
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 

Destaque (11)

steganography and watermarking
steganography and watermarkingsteganography and watermarking
steganography and watermarking
 
Audio Watermarking and Steganography
Audio Watermarking and SteganographyAudio Watermarking and Steganography
Audio Watermarking and Steganography
 
Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)Steganography chandni verma(cse 4th year)
Steganography chandni verma(cse 4th year)
 
Steganography
SteganographySteganography
Steganography
 
File000133
File000133File000133
File000133
 
Honeypot and Steganography
Honeypot and SteganographyHoneypot and Steganography
Honeypot and Steganography
 
Steganography ProjectReport
Steganography ProjectReportSteganography ProjectReport
Steganography ProjectReport
 
Steganography ppt
Steganography pptSteganography ppt
Steganography ppt
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 
Steganography
SteganographySteganography
Steganography
 

Semelhante a Skin tone based steganography

International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniquesRashmi Tank
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Mumbai Academisc
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisIOSR Journals
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute Peoplepaperpublications3
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 

Semelhante a Skin tone based steganography (20)

Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
International Journal of Engineering Research and Development (IJERD)
 International Journal of Engineering Research and Development (IJERD) International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Image Steganography Techniques
Image Steganography TechniquesImage Steganography Techniques
Image Steganography Techniques
 
Image steganography techniques
Image steganography techniquesImage steganography techniques
Image steganography techniques
 
regions
regionsregions
regions
 
Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)Implementation of bpcs steganography (synopsis)
Implementation of bpcs steganography (synopsis)
 
E017263040
E017263040E017263040
E017263040
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
A Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and AnalysisA Novel Edge Detection Technique for Image Classification and Analysis
A Novel Edge Detection Technique for Image Classification and Analysis
 
I1803014852
I1803014852I1803014852
I1803014852
 
I017535359
I017535359I017535359
I017535359
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
Sign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute PeopleSign Language Recognition Using Image Processing For Mute People
Sign Language Recognition Using Image Processing For Mute People
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Skin tone based steganography

  • 1. Skin Tone Based Image Steganography Girish Ram M R7121
  • 2. What is Steganography?? Steganography is the ART OF HIDING the secret and confidentional data in another transmission medium to achieve secret communication. Hiding of data in Image is called Image Steganography.
  • 3. Why do we need Steganography?? Internet serves as an important role for data transmission and sharing. It is a worldwide and publicized medium, some confidential data might be stolen, copied, modified, or destroyed Security problems become an essential issue. Encryption is a well-know procedure for secured data transmission
  • 4. Why not Encryption?? Encryption is the process of encoding messages (or information) into a form that cannot be easily understood by unauthorized people. Disadv of encryption: They make the secret messages unreadable and unnatural, These unnatural messages usually attract some unintended observer’s attention. Therefore, Digital Steganography is a new security approach for the transmission of confidential data
  • 6. Comparison b/w Steganography & Watermarking Both are branches of data hiding. Watermarking is the technique of embedding digital marks inside a container(image) so that there is a logical way of extracting the data embedded. Here no harming of container. Steganography uses the cover file to deliver its secret message while watermarking considers the cover file as the important data that is to be preserved. Steganography is used for secret communication while watermarking is used for authentication.
  • 7. Fig1. Trade off b/w embedding capacity, Robustness and undetectability in Data hiding Embedding Capacity Naive steganographic technique Secure steganographic technique Digital Watermarking Undetectability Robustness Steganography pay attention to the degree of invisibility while Watermarking pay most of its attribute to the robustness of the message and its ability to withstand attacks of removal.
  • 8. Existing Methods for Image Steganography LSB(Least Significant Bit) Substitution based. Transform domain based. Adaptive method. Proposed Method Biometrics based steganography using DWT(Discrete Wavelet Transform) Biometric feature used is Skin tone region of images. In this method secret data is embedded within skin region. Skin region are not sensitive to HVS(Human Visual System).
  • 9. Overview of method First: Skin tone detection is performed on input image using HSV (Hue, saturation, value). Second: Cover image is transformed in frequency domain using Haar-DWT. Payload number calculated. Finally Secret message is embedded in one of the high frequency sub-band by tracing skin pixels in that band. Embedding steps are applied to 2 cases: With Cropping Without Cropping Both cases uses different embedding algorithm.
  • 10. With Cropping First cropping on input image is performed and only in cropped region data hiding is performed. Cropped region works as a key at decoding side. More Secure. Without Cropping Data is embedded in whole Skin region image. Embedding algorithm attempts to preserve histogram of DWT coefficients after embedding.
  • 11. Skin Tone Detection Using HSV Aim: Discriminate b/w skin & non-skin pixels. Transforms a given pixel into an appropriate color space. Uses a skin classifier to label the pixel whether it is a skin or a non-skin pixel. Skin detection algo produces a mask – black and white. White pixel = 1 Skin pixel. Black pixel = 0  Non-Skin pixel.
  • 12. How to decide weather a pixel is skin or not skin? RGB matrix of the given color image is converted into different color spaces to yield distinguishable regions of skin or near skin tone. Mainly two kinds of color spaces are available HSV (Hue, Saturation and Value) and YCbCr spaces. It is experimentally found that the distribution of human skin color constantly resides in a certain range within the color space. Here HSV color space is chosen.
  • 13. Cont’d.. RGB image is converted into HSV color space. In HSV, responsible values for skin detection are Hue & Saturation. Extract Hue & Saturatn dimensions into separate new variables (H & S). For Skin detection threshold is chosen as [H1, S1] & [H2,S2]. Sobottaka & Pitas defined a face localization based on HSV. They found that the threshold range of human flesh as: Smin= 0.23, Smax =0.68, Hmin =0° & Hmax=50°.
  • 14. HSV Color model Pure HueWhite Tints  Hue at 0o is red  Hue at 120o is green  Hue at 240o is blue YCbCr Model Black Shade Tones
  • 16. DWT and Haar-DWT This is one of the Frequency domain in which Steganography can be implemented. In this work DWT better than DCT. Haar-DWT is simplest form of DWT. DWT splits component into numerous frequency sub bands as: LL – Horizontally and vertically low pass LH – Horizontally low pass and vertically high pass HL - Horizontally high pass and vertically low pass HH - Horizontally and vertically high pass Human eyes are more sensitive to the low frequency part (LL sub-band). Hence secret message in hidden other 3 parts.
  • 17. Haar-DWT  Adv: High Computation Speed, Simplicity.  Performs row and column transformation of Image matrix. Procedure 1.Haar DWT of an array 2.Using Matrix Multiplication:  If A is matrix on which we want to perform Haar-DWT, row transform is performed using Q=A×P , where P=  O/P of row transform becomes I/P at column transform.  Column transformation is obtained using R= P’× Q where P’ is transpose of P.  Matrix P performs averaging and differencing operation.  Result is four sub-bands. 1 0 1 0 1 0 -1 0 0 1 0 1 0 1 0 -1
  • 18. Encoding Suppose C is original 24-bit color cover image of M×N size. C= {xij, yij, zij |1<=i<=M, 1<= j . N, xij, yij, zij in {0, 1,.., 255}} Let S is secret data. Here secret data considered is binary image of size a×b. Two cases of Encoding process:  With cropping  Without cropping
  • 19. With Cropping Let size of cropped image is Mc×Nc where Mc≤M and Nc≤N and Mc=Nc. i.e. Cropped region must be exact square as we have to apply DWT later. Step1:Apply skin tone detection on cover image. This will produce mask image that contains skin and non skin pixels. Step2: Cropping is done interactively on image (Mc×Nc). Note: Cropped area must be an exact square and cropped area should contain skin region such as face, hand etc.  Cropped rectangle will act as key at receiving side.
  • 20. Step3: Apply DWT to cropped area. This yields 4 sub-bands denoted as HLL, HHL,HLH,HHH Payload of image is determined based on nos of skin pixels present in one of high frequency sub-band. Embedding in LL sub-band affects image quality greatly. Step4: Embedding in high frequency HH sub-band is done only in skin pixels. Skin pixels are traced using skin mask detected earlier secret data is embedded Embedding is performed in G-plane and B-plane of RBG but strictly not in R-plane as contribution of R plane in skin color is more. Embedding is done as per raster-scan order.
  • 21. Step5: Perform IDWT to combine 4 sub-bands. Step6: A cropped stego image of size Mc×Nc is obtained. Merge the cropped stego image with original image to get the stego image of size M×N. For merging coefficients of first and last pixels of cropped area in original image is required so that R is calculated. Finally, Stego image is ready for secret communications.
  • 22. Flowchart of With Cropping case of Embedding Process
  • 23.
  • 24. Without Cropping There is a major difference is actual embedding algorithm. In this embedding algorithm, Data is hidden such that the histogram of the cover image shouldn’t get modified. Step1:Apply skin tone detection. Step2: Separate R, G, B planes, Apply DWT to B plane. Skin pixels from HH sub-band are retrieved and stored in one matrix.
  • 25. Step3: Apply embedding algorithm to retrieved matrix. Here, start from first pixel and using pseudorandom sequence its corresponding pixel for pair is found. To create a pseudo random sequence Lehmer’s Congruential generator is used. It generates non overlapping random sequence. Lehmer invented the multiplicative congruential algorithm - which is the basis for many of the random number generators today. Lehmer's generators involve 3 integer parameters a, c, and m, and an initial value x0, called the seed xk+1 = axk + c mod m Pairs are formed using this equation.
  • 26. Embedding algorithm • Input- matrix of only skin pixels, let it is S and secret • message bits of size M • Output- Modified matrix of only skin pixels • Begin • 1] Select non-overlapping, random pair from S. Let it be p1, p2. • If count (message bits)=M then • goto End • Else • goto step 2 • 2] if p1=p2 then • goto step 1 (choose other pair)
  • 27.  3] if p1‚ p2 then  goto step 4.  4] if message bit =0 then  if p1>p2 then  swap (p1,p2).  Choose next message bit.  Else Choose next message bit.  goto step 1.  5] if message bit=1 then  if p1<p2 then  swap(p1,p2)  Choose next message bit.  else Choose next message bit.  goto step 1.  End
  • 28. Step4: This modified matrix of only skin pixels is restored in HH sub-band. Step5: Apply IDWT to merge all the sub-bands. Finally, Stego image is ready.
  • 29. Decoding Case 1- With Cropping In this case we must need a value of cropped area to retrieve data. Suppose cropped area value is stored in ‘rect’ variable. ‘rect’ will act as a key at decoder side. By tracing skin pixels in HHH sub-band of DWT secret data is retrieved.
  • 30. Case 2- Without Cropping In this case extraction of secret data is done without cropping. Decoding requires finding skin pixel pairs that are used for embedding. These pixel pairs are found by generating non-overlapping, random sequence using Lehmer’s Congruential generator.  Once correct pixel pairs are found, based on their values either one or zero of secret data is decided.
  • 32. Performance Measure Peak signal to noise ratio (PSNR) is used to evaluate quality of stego image after embedding the secret message. PSNR is defined as: Xij and Yij represents pixel values of original cover image and stego image respectively.
  • 33. PSNR usually adopts dB value for quality judgement. The larger PSNR is, higher the image quality. On the contrary smaller dB value means there is a more distortion. PSNR values falling below 30dB indicate fairly a low quality. However, high quality strives for 40dB or more.
  • 34. Capacity and PSNR of 4 final stego images in proposed method. CASE A- WITHOUT CROPPING CASE B- WITH CROPPING
  • 35. Conclusion Digital Steganography is a fascinating scientific area which falls under the umbrella of security systems. Skin Tone based Steganography is presented that uses skin region of images in DWT domain for embedding secret data. Two cases for data embedding are considered, with cropping and without cropping. According to performance measure results, proposed approach provides fine image quality. Since PSNR of all images are above 40db.