SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
Research Inventy: International Journal Of Engineering And Science
Issn: 2278-4721, Vol.2, Issue 4 (February 2013), Pp 31-35
Www.Researchinventy.Com

Integer Wavelet Transform Based Steganographic Method Using
                       Opa Algorithm
                                                 S.Jayasudha


Abstract - This paper deals with secret communication in open environment like internet. Steganography
attempts to hide the secret information and make communication undetectable. Steganography is used to
conceal the secret information so that no one can sense the information.Steganographic method has many
challenges such as high hiding capacity and imperceptibility. In existing paper have some problems like less
robust and low hiding capacity. so in this paper I use integer wavelet transform(IWT) for increasing hiding
capacity and Optimum pixel adjustment algorithm(OPA) for enhancing the image quality use MATLAB to
implement my paper, because which has many inbuilt functions and easy to use.

Keywords- Steganography, Integer wavelet transform, Optimum pixel adjustment algorithm.

                                            I.       Introduction
          Steganography is the art and science of writing hidden messages in such a way that no one, apart from
the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
The word Steganography is of Greek origin and means "concealed writing" from the Greek words steganos
meaning "covered or protected", and graphic meaning "writing". The first recorded use of the term was in
1499.The advantage of Steganography, over cryptography alone, is that message do not attract attention to
themselves. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion, and may in
themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects
the contents of a message, Steganography can be said to protect both messages and communicating parties. It
includes the concealment of information within computer files .In digital Steganography, electronic
communications may include steganographic coding inside of a transport layer, such as a document file, image
file, program or protocol. Media files are ideal for steganographic transmission because of their large size. The
Least Significant Bit (LSB) substitution is an example of spatial domain techniques. The basic idea in LSB is
the direct replacement of LSBs of noisy or unused bits of the cover image with the secret message bits. Till now
LSB is the most preferred technique used for data hiding because it is simple to implement offers high hiding
capacity, and provides a very easy way to control stego-image quality [1] but it has low robustness to
modifications made to the stego-image such as low pass filtering and compression and also low imperceptibility.
Algorithms using LSB in greyscale images can be found in [2, 3, 4].

          The other type of hiding method is the transform domain techniques which appeared to overcome the
robustness and imperceptibility problems found in the LSB substitution techniques. There are many transforms
that can be used in data hiding, the most widely used transforms are; the discrete cosine transform (DCT) which
is used in the common image compression format JPEG and MPEG, the discrete wavelet transform (DWT) and
the discrete Fourier transform (DFT). Most recent researches are directed to the use of DWT since it is used in
the new image compression format JPEG2000 and MPEG4, examples of using DWT can be found in [9, 10].In
[7] the secret message is embedded into the high frequency coefficients of the wavelet transform while leaving
the low frequency coefficients sub band unaltered. While in [8].The advantages of transform domain techniques
over spatial domain techniques are their high ability to tolerate noises and some signal processing operations but
on the other hand they are computationally complex and hence slower [9]. Some of these techniques try to
achieve the high hiding capacity low distortion result by using adaptive techniques that calculate the hiding
capacity of the cover according to its local characteristics as in [2, 5, 7, 8]. However, the steganographic
transform-based techniques have the following disadvantages; low hiding capacity and complex computations
[9, 10]. Thus, to get over these disadvantages, the present paper, the use of optimum pixel adjustment algorithm
to hide data into the integer wavelet coefficients of the cover image in order to maximize the hiding capacity as
much as possible. We also used a pseudorandom generator function to select the embedding locations of the
integer wavelet coefficients to increase the system security.




                                                       31
Integer Wavelet Transform Based Steganographic…
                                     II.      Integer Wavelet Transform
         Generally wavelet domain allows us to hide data in regions that the human visual system (HVS) is less
sensitive to, such as the high resolution detail bands (HL, LH and HH), Hiding data in these regions allow us to
increase the robustness while maintaining good visual quality. Integer wavelet transform maps an integer data
set into another integer data set. In discrete wavelet transform, the used wavelet filters have floating point
coefficients so that when we hide data in their coefficients any truncations of the floating point values of the
pixels that should be integers may cause the loss of the hidden information which may lead to the failure of the
data hiding system [9]. To avoid problems of floating point precision of the wavelet filters when the input data
is integer as in digital images, the output data will no longer be integer which doesn't allow perfect
reconstruction of the input image [10] and in this case there will be no loss of information through forward and
inverse transform [9]. Due to the mentioned difference between integer wavelet transform (IWT) and discrete
wavelet transform (DWT) the LL sub band in the case of IWT appears to be a close copy with smaller scale of
the original image while in the case of DWT the resulting LL sub band is distorted. Lifting schemes is one of
many techniques that can be used to perform integer wavelet transform it is also the scheme used in this paper.
The following is an example showing how we can use lifting schemes to obtain integer wavelet transform by
using simple truncation and without losing inevitability.
The Haar wavelet transform can be written as simple pair wise averages and differences:

              S1,n = (S0.2n +S0.2) /2
             d1,n =S0.2n-S0.2n                  (1)
Where Si, 1, di, 1 is the nth low frequency and high frequency wavelet coefficients at the Ith level respectively.
It is obvious that the output is not integer, the Haar wavelet transform in (1) can be rewritten using lifting in two
steps to be executed sequentially:
            dl,n= S0.2n+1 – S0.2n
            SI,n=S0.2n+dl.nl2                     (2)
From (1) and (2) we can calculate the integer wavelet transform according to:
            dl .n= S0.2n+ 1 – S0.2n
           SI.n=0.2n+ (d1, n/2)                  (3)
Then the inverse transform can be calculated by
           S0.2,n =S1,n-(d1,n/2)
           S0.2n+1=dl,n+S0.2n           (4)

                                           III.     Proposed System
The Embedding Algorithm:
The blocks of the embedding algorithm is explained in the following steps:
Step 1: Read the cover image file into a two dimensional decimal array to handle the file data more easily.

Step 2: Histogram modification it is used to prevent overflow/underflow that occurs when the changed values in
         Integer wavelet coefficients produce stego-image pixel values to exceed 255 or to be smaller than 0.
         This problem was found to be caused by the values near 255 or 0.

Step 3: Divide the cover image into 8x8 non overlapping blocks. By this division each 8x8 block can be
        categorized as a smooth or complex block.

Step 4: Transform each block to the transform domain using 2D Haar integer wavelet transform resulting LLI,
        LHI, HLI and HHI.

Step 5: Calculate hiding capacity of each coefficient, we used a modified version of the hiding capacity
        function. From experiments we found that as we lower the bits used to hide the secret message in the
        LL sub band the resulted distortion in the stego-image becomes lower; so that we modified this hiding
        capacity function by using different ranges for k for the LH, HL and HH sub bands where its values are
        form 1 to 4. For the LL sub band the value of k is equal to 0 and in some cases the bits used is fixed to
        only bits to enhance the stego-image quality.

Step 6: Embed L bits of message into the corresponding randomly chosen coefficients. Random selection of
        coefficients provides more security where the sequence of the message is only known to both sender
        and receiver by using a previously agreed upon secret key.



                                                         32
Integer Wavelet Transform Based Steganographic…

Step 7: Apply optimal pixel adjustment algorithm, while taking into consideration that each modified coefficient
        stays in its hiding capacity range where each value of L is calculated according to the absolute value of
        the wavelet coefficients any significant change in this value will produce different value of L to be
        calculated at the receiver. The main idea of using the optimum pixel adjustment (OPA) algorithm is to
        minimize the error difference

Cryptography is the science of encrypting data in such a way that nobody can understand the encrypted
message, whereas in Steganography the existence of data is conceived means its presence cannot be noticed.
The information to be hidden is embedded into the cover object which can be text, image, audio or video so that
the appearance of cover object doesn’t vary even after the information is hidden. To add more security the data
to be hidden is encrypted with a key before embedding. To extract the hidden information one should have the
key. A stego object is one, which looks exactly same as cover object with an hidden information. Secure secret
communications where cryptographic encryption methods are not available. Secure secret communication where
strong cryptography is impossible. The military side two parties’ communication can be very importance in
security purpose




                                     Fig: 1. Blocks of embedding diagram

Between the original coefficient value and the altered value by checking the right next bit to the modified LSBs
                                  so that the resulted change will be minimal.

Step 8: finally, calculate the inverse integer wavelet transform on each 8x8 block to restore the image to spatial
                                                      domain.

The main idea of using the optimum pixel adjustment (OPA) algorithm is to minimize the error difference
betweenthe original coefficient value and the altered value by checking the right next bit to the modified LSBs
so that the resulted change will be minimal. The algorithm is the final step in the proposed scheme, where it
can minimize the error by half.The main idea of OP A is to check the bit right next to the last changed LSBs is
used to decrease the error resulted after insertion of message bits.

                                                       33
Integer Wavelet Transform Based Steganographic…
The Extraction Algorithm
          MATLAB is a numerical computing environment and fourth-generation programming language.
Developed by Math Works, MATLAB allows matrix manipulations, plotting of functions and data,
implementation of algorithms, creation of user interfaces, and interfacing with programs written in other
languages, including C, C++, Java, and Fortran. Although MATLAB is intended primarily for numerical
computing, an optional toolbox uses the MuPAD symbolic engine, allowing access to symbolic computing
capabilities. An additional package, Simulink, adds graphical multi-domain simulation and Model-Based Design
for dynamic and embedded systems. At the receiver uses the extraction algorithm to obtain the secret message.
The block diagram of the extraction algorithm is shown

                                           Stego image



                                                 Stgo image
                             Read the image file pixel value to a 2D decimal
                             matrix each value represents the pixel value
                             intensity




                                       Divide the cover image into blocks




                                  Transform each blocks to frequency domain



                             Calculate the number of bits to hide data of each
                             wavelet co efficient




                             Use the secret key to generate the selected co
                                                                                    key
                             efficient to embed secret data



                             Extract the L bit form each selected co efficient



                             Gather all extracted bit together to form the secret
                             data back in corder




                                               Secret information



                                Figure2.The block diagram of extraction algorithm

                                                     IV.            Conclusions
         In this paper i proposed a data hiding scheme that hides data into the integer wavelet coefficients of an
image. The system combines a data hiding technique and the optimum pixel adjustment algorithm to increase
the hiding capacity of the system compared to other systems. The proposed system hide secret data in a random
order using a secret key only known to both sender and receiver. In this method, embeds different number of
bits in each wavelet co efficicient according to a hiding capacity function in order to increasing the hiding
capacity without losses of the visual quality of resulting stego image. The proposed system also minimizes the
error difference between original coefficients values and modified values by using the optimum pixel
adjustment algorithm.



                                                                     34
Integer Wavelet Transform Based Steganographic…

                                                           References
[1]    N. Wu and M. Hwang. "Data Hiding: Current Status and Key Issues," International Journal of Network Security, Vol.4, No.1, pp. 1-
       9, Jan.2007..
[2]    C. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469-474, Mar. 2004.
[3]    Changa, C. Changa, P. S. Huangb, and T. Tua, "A Novel bnage Steganographic Method Using Tri-way Pixel-Value Differencing,”
       Journal of Multimedia, Vol. 3, No.2, June 2008.
[4]    H. H. Zayed, "A High-Hiding Capacity Technique for Hiding Data in images Based on K-Bit LSB Substitution," The 30th
       International Conference on Artificial Intelligence Applications (ICAIA - 2005) Cairo, Feb. 2005.
[5]    A. Westfeld, "F5a steganographic algorithm: High capacity despite better steganalysis," 4th International Workshop on Information
       Hiding, pp.289-302, April 25-27, 2001.
[6]    H. W. Tseng and C. C. Chnag, "High capacity data hiding in jpegcompressed images," Informatica, vol. 15, no. I, pp. 127-142,2004.
[7]    P. Chen, and H. Lin, "A DWT Approach for bnage Steganography,"International Journal of Applied Science and Engineering 2006.
       4, 3:275:290.
[8]    Lai and L. Chang, "Adaptive Data Hiding for bnages Based on Harr Discrete Wavelet transform," Lecture Notes in Computer
       Science,Volume 4319/2006.
[9]    S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE
       Transactions on Information Forensics and Security, Vol. 2, No.3, Sep. 2007, pp. 321-330.
[10]   M. Ramani, Dr. E. V. Prasad and Dr. S. Varadarajan,"Steganography Using BPCS the Integer Wavelet Transformed bnage",
       UCSNS International Journal of Computer Science and Network Security, VOL. 7 No.7, July 2007.




                                                                 35

Mais conteúdo relacionado

Mais procurados

Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganographyGirish Ram M
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingeSAT Publishing House
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadeSAT Journals
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsIJTET Journal
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup PalarapwarANUP PALARAPWAR
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batuABHIJEET KHIRE
 
IRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET Journal
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSIJNSA Journal
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 

Mais procurados (20)

Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYTEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORY
 
N043020970100
N043020970100N043020970100
N043020970100
 
Skin tone based steganography
Skin tone based steganographySkin tone based steganography
Skin tone based steganography
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm Information Hiding using LSB Technique based on Developed PSO Algorithm
Information Hiding using LSB Technique based on Developed PSO Algorithm
 
Steganography
SteganographySteganography
Steganography
 
An ideal steganographic scheme in networks using
An ideal steganographic scheme in networks usingAn ideal steganographic scheme in networks using
An ideal steganographic scheme in networks using
 
An ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payloadAn ideal steganographic scheme in networks using twisted payload
An ideal steganographic scheme in networks using twisted payload
 
Color Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic MapsColor Image Encryption and Decryption Using Multiple Chaotic Maps
Color Image Encryption and Decryption Using Multiple Chaotic Maps
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
Steganography - Anup Palarapwar
Steganography - Anup PalarapwarSteganography - Anup Palarapwar
Steganography - Anup Palarapwar
 
Phase one image steganography_batu
Phase one image steganography_batuPhase one image steganography_batu
Phase one image steganography_batu
 
G0523444
G0523444G0523444
G0523444
 
Thesis Background
Thesis BackgroundThesis Background
Thesis Background
 
IRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based SteganographyIRJET- Wavelet Transform based Steganography
IRJET- Wavelet Transform based Steganography
 
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDSHYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 

Destaque (7)

Chromatography: Analysis of Phosphate and Manganese degradation Products in A...
Chromatography: Analysis of Phosphate and Manganese degradation Products in A...Chromatography: Analysis of Phosphate and Manganese degradation Products in A...
Chromatography: Analysis of Phosphate and Manganese degradation Products in A...
 
Generos
GenerosGeneros
Generos
 
Are you sure you are marketable - WikiStage Oran
Are you sure you are marketable - WikiStage OranAre you sure you are marketable - WikiStage Oran
Are you sure you are marketable - WikiStage Oran
 
ACTIVIDAD 6. PAOLA GARCIA
ACTIVIDAD 6. PAOLA GARCIAACTIVIDAD 6. PAOLA GARCIA
ACTIVIDAD 6. PAOLA GARCIA
 
фонетические упражнения
фонетические упражненияфонетические упражнения
фонетические упражнения
 
CreBiz - Pilot Evaluation Insights
CreBiz - Pilot Evaluation InsightsCreBiz - Pilot Evaluation Insights
CreBiz - Pilot Evaluation Insights
 
око орган за гледање
око орган за гледањеоко орган за гледање
око орган за гледање
 

Semelhante a Research Inventy : International Journal of Engineering and Science

Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF irjes
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image SteganographyIRJET Journal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINijcisjournal
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY IJCNCJournal
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyIJCNCJournal
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...IJRES Journal
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain ijcisjournal
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145IJRAT
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet TransformIRJET Journal
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdfssusere02009
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Journals
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesRick Vogel
 

Semelhante a Research Inventy : International Journal of Engineering and Science (20)

Bj31416421
Bj31416421Bj31416421
Bj31416421
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
 
F045033440
F045033440F045033440
F045033440
 
IRJET- Data Embedding using Image Steganography
IRJET-  	  Data Embedding using Image SteganographyIRJET-  	  Data Embedding using Image Steganography
IRJET- Data Embedding using Image Steganography
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAINA SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
A SECURE COLOR IMAGE STEGANOGRAPHY IN TRANSFORM DOMAIN
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain A Secure Color Image Steganography in Transform Domain
A Secure Color Image Steganography in Transform Domain
 
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyA Good Performance OTP Encryption Image based on DCT-DWT Steganography
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
 
Paper id 212014145
Paper id 212014145Paper id 212014145
Paper id 212014145
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Cv4201644655
Cv4201644655Cv4201644655
Cv4201644655
 
IJREAMV03I022640.pdf
IJREAMV03I022640.pdfIJREAMV03I022640.pdf
IJREAMV03I022640.pdf
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 

Research Inventy : International Journal of Engineering and Science

  • 1. Research Inventy: International Journal Of Engineering And Science Issn: 2278-4721, Vol.2, Issue 4 (February 2013), Pp 31-35 Www.Researchinventy.Com Integer Wavelet Transform Based Steganographic Method Using Opa Algorithm S.Jayasudha Abstract - This paper deals with secret communication in open environment like internet. Steganography attempts to hide the secret information and make communication undetectable. Steganography is used to conceal the secret information so that no one can sense the information.Steganographic method has many challenges such as high hiding capacity and imperceptibility. In existing paper have some problems like less robust and low hiding capacity. so in this paper I use integer wavelet transform(IWT) for increasing hiding capacity and Optimum pixel adjustment algorithm(OPA) for enhancing the image quality use MATLAB to implement my paper, because which has many inbuilt functions and easy to use. Keywords- Steganography, Integer wavelet transform, Optimum pixel adjustment algorithm. I. Introduction Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. The word Steganography is of Greek origin and means "concealed writing" from the Greek words steganos meaning "covered or protected", and graphic meaning "writing". The first recorded use of the term was in 1499.The advantage of Steganography, over cryptography alone, is that message do not attract attention to themselves. Plainly visible encrypted messages no matter how unbreakable will arouse suspicion, and may in themselves be incriminating in countries where encryption is illegal. Therefore, whereas cryptography protects the contents of a message, Steganography can be said to protect both messages and communicating parties. It includes the concealment of information within computer files .In digital Steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. The Least Significant Bit (LSB) substitution is an example of spatial domain techniques. The basic idea in LSB is the direct replacement of LSBs of noisy or unused bits of the cover image with the secret message bits. Till now LSB is the most preferred technique used for data hiding because it is simple to implement offers high hiding capacity, and provides a very easy way to control stego-image quality [1] but it has low robustness to modifications made to the stego-image such as low pass filtering and compression and also low imperceptibility. Algorithms using LSB in greyscale images can be found in [2, 3, 4]. The other type of hiding method is the transform domain techniques which appeared to overcome the robustness and imperceptibility problems found in the LSB substitution techniques. There are many transforms that can be used in data hiding, the most widely used transforms are; the discrete cosine transform (DCT) which is used in the common image compression format JPEG and MPEG, the discrete wavelet transform (DWT) and the discrete Fourier transform (DFT). Most recent researches are directed to the use of DWT since it is used in the new image compression format JPEG2000 and MPEG4, examples of using DWT can be found in [9, 10].In [7] the secret message is embedded into the high frequency coefficients of the wavelet transform while leaving the low frequency coefficients sub band unaltered. While in [8].The advantages of transform domain techniques over spatial domain techniques are their high ability to tolerate noises and some signal processing operations but on the other hand they are computationally complex and hence slower [9]. Some of these techniques try to achieve the high hiding capacity low distortion result by using adaptive techniques that calculate the hiding capacity of the cover according to its local characteristics as in [2, 5, 7, 8]. However, the steganographic transform-based techniques have the following disadvantages; low hiding capacity and complex computations [9, 10]. Thus, to get over these disadvantages, the present paper, the use of optimum pixel adjustment algorithm to hide data into the integer wavelet coefficients of the cover image in order to maximize the hiding capacity as much as possible. We also used a pseudorandom generator function to select the embedding locations of the integer wavelet coefficients to increase the system security. 31
  • 2. Integer Wavelet Transform Based Steganographic… II. Integer Wavelet Transform Generally wavelet domain allows us to hide data in regions that the human visual system (HVS) is less sensitive to, such as the high resolution detail bands (HL, LH and HH), Hiding data in these regions allow us to increase the robustness while maintaining good visual quality. Integer wavelet transform maps an integer data set into another integer data set. In discrete wavelet transform, the used wavelet filters have floating point coefficients so that when we hide data in their coefficients any truncations of the floating point values of the pixels that should be integers may cause the loss of the hidden information which may lead to the failure of the data hiding system [9]. To avoid problems of floating point precision of the wavelet filters when the input data is integer as in digital images, the output data will no longer be integer which doesn't allow perfect reconstruction of the input image [10] and in this case there will be no loss of information through forward and inverse transform [9]. Due to the mentioned difference between integer wavelet transform (IWT) and discrete wavelet transform (DWT) the LL sub band in the case of IWT appears to be a close copy with smaller scale of the original image while in the case of DWT the resulting LL sub band is distorted. Lifting schemes is one of many techniques that can be used to perform integer wavelet transform it is also the scheme used in this paper. The following is an example showing how we can use lifting schemes to obtain integer wavelet transform by using simple truncation and without losing inevitability. The Haar wavelet transform can be written as simple pair wise averages and differences: S1,n = (S0.2n +S0.2) /2 d1,n =S0.2n-S0.2n (1) Where Si, 1, di, 1 is the nth low frequency and high frequency wavelet coefficients at the Ith level respectively. It is obvious that the output is not integer, the Haar wavelet transform in (1) can be rewritten using lifting in two steps to be executed sequentially: dl,n= S0.2n+1 – S0.2n SI,n=S0.2n+dl.nl2 (2) From (1) and (2) we can calculate the integer wavelet transform according to: dl .n= S0.2n+ 1 – S0.2n SI.n=0.2n+ (d1, n/2) (3) Then the inverse transform can be calculated by S0.2,n =S1,n-(d1,n/2) S0.2n+1=dl,n+S0.2n (4) III. Proposed System The Embedding Algorithm: The blocks of the embedding algorithm is explained in the following steps: Step 1: Read the cover image file into a two dimensional decimal array to handle the file data more easily. Step 2: Histogram modification it is used to prevent overflow/underflow that occurs when the changed values in Integer wavelet coefficients produce stego-image pixel values to exceed 255 or to be smaller than 0. This problem was found to be caused by the values near 255 or 0. Step 3: Divide the cover image into 8x8 non overlapping blocks. By this division each 8x8 block can be categorized as a smooth or complex block. Step 4: Transform each block to the transform domain using 2D Haar integer wavelet transform resulting LLI, LHI, HLI and HHI. Step 5: Calculate hiding capacity of each coefficient, we used a modified version of the hiding capacity function. From experiments we found that as we lower the bits used to hide the secret message in the LL sub band the resulted distortion in the stego-image becomes lower; so that we modified this hiding capacity function by using different ranges for k for the LH, HL and HH sub bands where its values are form 1 to 4. For the LL sub band the value of k is equal to 0 and in some cases the bits used is fixed to only bits to enhance the stego-image quality. Step 6: Embed L bits of message into the corresponding randomly chosen coefficients. Random selection of coefficients provides more security where the sequence of the message is only known to both sender and receiver by using a previously agreed upon secret key. 32
  • 3. Integer Wavelet Transform Based Steganographic… Step 7: Apply optimal pixel adjustment algorithm, while taking into consideration that each modified coefficient stays in its hiding capacity range where each value of L is calculated according to the absolute value of the wavelet coefficients any significant change in this value will produce different value of L to be calculated at the receiver. The main idea of using the optimum pixel adjustment (OPA) algorithm is to minimize the error difference Cryptography is the science of encrypting data in such a way that nobody can understand the encrypted message, whereas in Steganography the existence of data is conceived means its presence cannot be noticed. The information to be hidden is embedded into the cover object which can be text, image, audio or video so that the appearance of cover object doesn’t vary even after the information is hidden. To add more security the data to be hidden is encrypted with a key before embedding. To extract the hidden information one should have the key. A stego object is one, which looks exactly same as cover object with an hidden information. Secure secret communications where cryptographic encryption methods are not available. Secure secret communication where strong cryptography is impossible. The military side two parties’ communication can be very importance in security purpose Fig: 1. Blocks of embedding diagram Between the original coefficient value and the altered value by checking the right next bit to the modified LSBs so that the resulted change will be minimal. Step 8: finally, calculate the inverse integer wavelet transform on each 8x8 block to restore the image to spatial domain. The main idea of using the optimum pixel adjustment (OPA) algorithm is to minimize the error difference betweenthe original coefficient value and the altered value by checking the right next bit to the modified LSBs so that the resulted change will be minimal. The algorithm is the final step in the proposed scheme, where it can minimize the error by half.The main idea of OP A is to check the bit right next to the last changed LSBs is used to decrease the error resulted after insertion of message bits. 33
  • 4. Integer Wavelet Transform Based Steganographic… The Extraction Algorithm MATLAB is a numerical computing environment and fourth-generation programming language. Developed by Math Works, MATLAB allows matrix manipulations, plotting of functions and data, implementation of algorithms, creation of user interfaces, and interfacing with programs written in other languages, including C, C++, Java, and Fortran. Although MATLAB is intended primarily for numerical computing, an optional toolbox uses the MuPAD symbolic engine, allowing access to symbolic computing capabilities. An additional package, Simulink, adds graphical multi-domain simulation and Model-Based Design for dynamic and embedded systems. At the receiver uses the extraction algorithm to obtain the secret message. The block diagram of the extraction algorithm is shown Stego image Stgo image Read the image file pixel value to a 2D decimal matrix each value represents the pixel value intensity Divide the cover image into blocks Transform each blocks to frequency domain Calculate the number of bits to hide data of each wavelet co efficient Use the secret key to generate the selected co key efficient to embed secret data Extract the L bit form each selected co efficient Gather all extracted bit together to form the secret data back in corder Secret information Figure2.The block diagram of extraction algorithm IV. Conclusions In this paper i proposed a data hiding scheme that hides data into the integer wavelet coefficients of an image. The system combines a data hiding technique and the optimum pixel adjustment algorithm to increase the hiding capacity of the system compared to other systems. The proposed system hide secret data in a random order using a secret key only known to both sender and receiver. In this method, embeds different number of bits in each wavelet co efficicient according to a hiding capacity function in order to increasing the hiding capacity without losses of the visual quality of resulting stego image. The proposed system also minimizes the error difference between original coefficients values and modified values by using the optimum pixel adjustment algorithm. 34
  • 5. Integer Wavelet Transform Based Steganographic… References [1] N. Wu and M. Hwang. "Data Hiding: Current Status and Key Issues," International Journal of Network Security, Vol.4, No.1, pp. 1- 9, Jan.2007.. [2] C. Chan and L. M. Cheng, "Hiding data in images by simple LSB substitution," Pattern Recognition, pp. 469-474, Mar. 2004. [3] Changa, C. Changa, P. S. Huangb, and T. Tua, "A Novel bnage Steganographic Method Using Tri-way Pixel-Value Differencing,” Journal of Multimedia, Vol. 3, No.2, June 2008. [4] H. H. Zayed, "A High-Hiding Capacity Technique for Hiding Data in images Based on K-Bit LSB Substitution," The 30th International Conference on Artificial Intelligence Applications (ICAIA - 2005) Cairo, Feb. 2005. [5] A. Westfeld, "F5a steganographic algorithm: High capacity despite better steganalysis," 4th International Workshop on Information Hiding, pp.289-302, April 25-27, 2001. [6] H. W. Tseng and C. C. Chnag, "High capacity data hiding in jpegcompressed images," Informatica, vol. 15, no. I, pp. 127-142,2004. [7] P. Chen, and H. Lin, "A DWT Approach for bnage Steganography,"International Journal of Applied Science and Engineering 2006. 4, 3:275:290. [8] Lai and L. Chang, "Adaptive Data Hiding for bnages Based on Harr Discrete Wavelet transform," Lecture Notes in Computer Science,Volume 4319/2006. [9] S. Lee, C.D. Yoo and T. Kalker, "Reversible image watermarking based on integer-to-integer wavelet transform," IEEE Transactions on Information Forensics and Security, Vol. 2, No.3, Sep. 2007, pp. 321-330. [10] M. Ramani, Dr. E. V. Prasad and Dr. S. Varadarajan,"Steganography Using BPCS the Integer Wavelet Transformed bnage", UCSNS International Journal of Computer Science and Network Security, VOL. 7 No.7, July 2007. 35