Sie sind auf Seite 1von 8

IPASJ International Journal of Computer Science(IIJCS)

Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm


A Publisher for Research Motivation ........ Email: editoriijcs@ipasj.org
Volume 1, Issue 1, June 2013 ISSN 2321-5992


Volume 1, Issue 1, June 2013 Page 6



ABSTRCT
Audio steganography is the science of hiding audio information into the cover image without causing statistically significant
modification to the cover image. In this paper, a new steganography method to hid radio signal in color images is presented.
The proposed method combines Least Significant Bit (LSB) which is the most simple and efficient technique used for audio
steganography, Discrete Cosine Transform (DCT), and Haar wavelet transform. Firstly, the background of the cover image is
separated from details, and then transforms it to Luminance-chrominance components. Haar wavelet transform and LSB bits
are applied on luminance component of the cover image. Secondly, radio signal is embedded, after compressed it using DCT, in
the different coefficients of the cover image to derive the stegoimage. The results showed that the proposed method gets
stegoimages with high quality.
Keywords: Audio Steganography, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), and Haar Wavelet
Transform (HWT)

1. INTRODUCTION
Steganography is an art of hiding some secret message in another message without letting anyone know about presence
of secret message except the intended receiver. The message used to hide secret message is called host message or cover
message. Once the contents of the host message or cover message are modified, the resultant message is known as stego
message. In other words, stego message is combination of host message and secret message. Steganography is often
mixed up with cryptography. Cryptography changes representation of secret message being transmitted while
steganography hides presence of secret message [1]. Steganography can be applied to different type of media including
text, audio and video. Among the different types of steganography audio steganography is more important because audio and video
can carry more redundant information compared to other media [2]. Audio steganography requires a text or audio secret
message to be embedded within a cover audio message. Due to availability of redundancy, the cover audio message
before steganography and stego message after steganography remains same. However, audio steganography is
considered more difficult than video steganography because the Human Auditory System (HAS) is more sensitive than
Human Visual System (HVS) [3].

In this paper, a new method for embedding the radio signal in the RGB cover image using Haar wavelet transform
sis presented. The RGB cover image is transform to luminance-chrominance components using YIQ color model [4]

(
(
(

Q
I
Y
=
0.311 - 0.523 - 0.212
0.322 0.274 - 0.596
0.114 0.587 0.299
(
(
(

(1)
B
G
R
(
(
(



The remainder of the paper is organized as follows: section 2 discussed audio steganography using Least Significant Bit
Insertion, Haar wavelet transforms, and Discrete Cosine Transform. The algorithms of Proposed method are presented
in section 3.section 4 explores experimental results. Conclusions and references are presented in sections5 and 6,
respectively.

Radio Signal Steganography Based on
Wavelet Transform

Bushra Q. AL-Abudi
1
and Nisreen A. AlSaffar
2


2
University of Baghdad, College of Science, Astronomy and Space Department, Baghdad-Iraq

IPASJ International Journal of Computer Science(IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email: editoriijcs@ipasj.org
Volume 1, Issue 1, June 2013 ISSN 2321-5992


Volume 1, Issue 1, June 2013 Page 7

2. AUDIO STEGANOGRAPHY
2.1 LEAST SIGNIFICANT BIT INSERTION
Least significant bit insertion, or LSB, is one of the most common techniques used to hide information in images.
When working with 24-bit /pixel images, three bits can be encoded into each pixel. Because the least significant bits
are the ones being altered, the change is difficult to determine by the viewer. Although this technique is popular due to
its simplicity, it is also one of the easiest methods to accidentally alter [5].
2.2. HAAR moving ridge rework (HWT)
Haar wavelet transform consists of both: low pass and high pass filters. It is the preferred wavelet because it can be
readily implemented in hardware. The high pass and low pass filters are called the decomposition filters because they
break the image down or decompose the image into detailed and approximation coefficients, respectively. The
approximation band (LL) is the result of applying low pass filter in vertical and horizontal directions, the (LH) band is
the result of applying horizontal low pass filter and vertical high pass filter, while the (HL) band is the result of
horizontal high pass filter and vertical low pass filter, and finally (HH) band is the result of horizontal and vertical high
pass filter. In this transform each (2x2) adjacent pixels are picked as group and passed simultaneously through four
filters (i.e., LL, HL, LH, and HH) to obtain the four wavelet coefficients, the bases of these 4-filters could be derived as
follows [6]:
The low and high filters are:
1) - 1 (
2
1
H
1) 1 (
2
1
L
=
=

Thus the horizontal low pass followed by the vertical low pass filter is equivalent to:
( )
|
|
.
|

\
|
=
|
|
.
|

\
|
=
1 1
1 1
2
1
1 1
1
1
2
1
LL

The horizontal high pass filter followed by vertical low pass filter is:
( )
|
|
.
|

\
|
=
|
|
.
|

\
|

=
1 - 1 -
1 1
2
1
1 1
1
1
2
1
HL

While the horizontal low pass filter followed by vertical high pass filter is equivalent:
( )
|
|
.
|

\
|
=
|
|
.
|

\
|
=
1 - 1
1 - 1
2
1
1 - 1
1
1
2
1
LH

and finally, the horizontal high pass filter followed by vertical high pass filter is:
( )
|
|
.
|

\
|
=
|
|
.
|

\
|

=
1 1 -
1 - 1
2
1
1 - 1
1
1
2
1
HH

DCT coefficients are used for JPEG compression. It separates the image into parts of differing importance. It
transforms a signal or image from the spatial domain to the frequency domain. It can separate the image into high,
middle and low frequency components. The general equation for a 1D (N data items) DCT is defined by the following
equation:

1 - ......N 0,1,2,.... u for
(2)
2
) 1 2 (
cos ) ( ) ( ) (
1
0
=
(

+
=

=
N
x
N
u x
x f u u C



The general equation for a 2D (N by M image) DCT is defined by the following equation:
IPASJ International Journal of Computer Science(IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email: editoriijcs@ipasj.org
Volume 1, Issue 1, June 2013 ISSN 2321-5992


Volume 1, Issue 1, June 2013 Page 8

1 ....... ,......... 2 , 1 , 0 ,
) 3 (
2
) 1 2 (
cos
2
) 1 2 (
cos ) , ( ) ( ) ( ) , (
1
0
1
0
=
(

+
(

+
=

=
N v u for
N
v y
N
u x
y x f v u v u C
N
x
N
y




Here, the input image is of size N X M. c(i, j) is the intensity of the pixel in row i and column j; C(u,v) is the DCT
coefficient in row u and column v of the DCT matrix. Signal energy lies at low frequency in image; it appears in the
upper left corner of the DCT. Compression can be achieved since the lower right values represent higher frequencies,
and generally small enough to be neglected with little visible distortion [7]. In DCT, when the audio signals is
transformed the most important DCT coefficients (i.e. high in values) will mostly be at the beginning of the DCT block,
so possible to replace the other unimportant coefficients (i.e. low in values) with zero, and the result of applying inverse
discrete cosine transform (IDCT) on the new set of coefficients will reconstruct the audio data that have an acceptable
quality [8].

3. ALGORITHMS of PROPOSED METHOD
In this section, we shall discuss the embedding and extracting procedure of the proposed method as follows:
A-Preparing the cover image for embedding process
1. Read cover image
2. Separate the background of the cover image from its details (the details component is going to be used for
embedding)
3. Convert the details component from RGB color model to Luminance-Chrominance components (YIQ color
model)
4. Apply Haar Wavelet Transform (HWT) on Y-component
5. Convert the wavelet coefficients of LH and HL to binary presentation
B-Preparing the payload (radio signal) for embedding process
1. Read the radio signal (.wav)
2. Compression the radio signal using DCT-transform
3. Convert the coefficients of the radio signal to binary presentation
C- Embedding algorithm
1. Apply LSB algorithm by replacing the LSBs of the image with LSBs of the signal using 4 least significant bits
2. Apply inverse Haar WT
3. Transform YIQ color model to RGB color model
4. Combine the details with the Background to find stego RGB image
D- Extraction process
1. Read stego image
2. Separate the background of the stego image from its details (the details component contain the payload)
3. Convert the details component from RGB-color model to YIQ-color model
4. Apply Haar Wavelet Transform (HWT) on Y-component
5. Convert the wavelet coefficients of LH and HL to binary presentation
6. Retrieve bits of payload and convert each 8 bit into pixel
Figures 1 and 2 illustrate the embedding and extraction processes .One of the major goals of data embedding is to let
the cover image and the stego image be perceptually similar. There are various image quality measures to compare two
images. Among them, the most widely used is the Peak Signal-to-Noise Ratio (PSNR), which is defined by the
equations 4 and 5[9]:
( ) (5) ) , ( ) , (
1
(4)
255
log 10
2
1
1
2
10

=
=

=
=
M
i
N
j
j i y j i x
N M
MSE
MSE
PSNR

Where x is the cover image, y is stego image; M and N are the dimensions of the images. Higher PSNR represents
better image quality.
IPASJ International Journal of Computer Science(IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email: editoriijcs@ipasj.org
Volume 1, Issue 1, June 2013 ISSN 2321-5992


Volume 1, Issue 1, June 2013 Page 9



Figure 1: Block diagram of embedding process


Figure 2: Block diagram of Extraction process
IPASJ International Journal of Computer Science(IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email: editoriijcs@ipasj.org
Volume 1, Issue 1, June 2013 ISSN 2321-5992


Volume 1, Issue 1, June 2013 Page 10

4. EXPERIMENTAL RESULTS
Our proposed method applied on luminance component of YIQ color model. A radio signal is embedded in luminance
component; figure 3 shows the RGB cover images (Nebula and Stellar Cluster) while figure 4 shows the embedded
radio signal.. The proposed method applied on one and two levels of Haar WT as shown in figures 5 and 6. The
stegoimages after applying one and two levels of Haar WT are illustrated in figures 7 and 8, respectively. Figures 9
and 10 represent the retrieved radio signals where 22 second radio signal was embeded in LH and HL coefficients of
one level HWT and 26 second radio signal was embeded in LH and HL coefficients of two level HWT,respectively.
Table 1 shows the results from applying the proposed method in term capacity, Peak Signal to Noise Ratio (PSNR), and
Root Mean Square Error (RMSE) between the cover image and the stegoimage.














a -Nebula b-Stellar Cluster
Figure3:Original Cover Images:









Figure4:The embedded radio signal






Figure4:The embedded radio signal


Figure5: One level Haar wavelet decomposition applied on Luminance component of cover images


IPASJ International Journal of Computer Science(IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email: editoriijcs@ipasj.org
Volume 1, Issue 1, June 2013 ISSN 2321-5992


Volume 1, Issue 1, June 2013 Page 11


Figure6: Two levels Haar wavelet decomposition applied on Luminance component of cover images









Figure7: The stegoimages after Appling one level Haar Wavelet decomposition of proposed method













Figure8: The stegoimages after Appling two levels Haar Wavelet decomposition of proposed method
.
Figure 9: The retrieved radio from applying proposed method for one level Haar wavelet transform (22 sec)

IPASJ International Journal of Computer Science(IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email: editoriijcs@ipasj.org
Volume 1, Issue 1, June 2013 ISSN 2321-5992


Volume 1, Issue 1, June 2013 Page 12



Figure 10: The retrieved radio after applying proposed method for two level Haar wavelet transform (26 sec)

Table 1: The results from applying the proposed method

Cover Images
(.JPEG)
(1024x1024)
Capacity
(bit)
PSNR
(dB)
RMSE
Nebula
2097152(1-level HWT) 30.5179 7.9669
2621440(2-level HWT) 28.4134

10.1199

Stellar Cluster
2097152(1-level HWT) 26.7660

12.2818

2621440(2-level HWT) 21.7478 21.7234

5. CONCLUSIONS
In this paper, we proposed an audio steganography method based on Haar wavelet transform. Separating the details of
the image from the background gave more convenient results than working on the image directly. The proposed method
transform RGB cover image to Luminance Chrominance components and employs Luminance component to embed
radio signal and combination of LSB, DCT and Haar WT to obtain stegoimage. The results indicated that two level
Haar wavelet transform of the proposed method has a high capacity with acceptable quality for embedding than one
level.
References
[1] K. Gopalan, "A Unified Audio and Image Steganography by Spectrum Modification", International Conference on
Industrial Technology, 2009.
[2] J. Antony, c., Sobin, and A.Sherly "Audio Steganography in Wavelet Domain A Survey" International Journal of
Computer Applications (0975 8887) Volume 52 No.13, August 2012
[3] K. Gopalan, "Audio steganography using bit modification", IEEE International Conference on Acoustics, Speech,
and Signal Processing, Page(s): II - 421-4 vol.2, 2003
[4] M. Sonka, V. Halva, and T.Boyle, Image Processing Analysis and Machine Vision, Brooks/Cole Publishing
Company, 2
nd
Ed., 1999.
[5] D. Sellar, Techniques for Data Hiding, In IBM Systems Journal, Vol. 35, Nos.3-4, pages 313-336, February
1999
[6] B.Q.Al-Abudi, Color Image Data Compression Using Multilevel Block Truncation Coding Technique, Ph.D.
Thesis submitted to College of Science, University of Baghdad, 2002
IPASJ International Journal of Computer Science(IIJCS)
Web Site: http://www.ipasj.org/IIJCS/IIJCS.htm
A Publisher for Research Motivation ........ Email: editoriijcs@ipasj.org
Volume 1, Issue 1, June 2013 ISSN 2321-5992


Volume 1, Issue 1, June 2013 Page 13

[7] E. Walia,P. Jain,and Navdeep" An Analysis of LSB & DCT based Steganography" Vol. 10 Issue 1, Global Journal
of Computer Science and Technology, April 2010.
[8] N. Ebraheem, Audio-Hiding System Using Wavelet and DCT TransformsB.Sc. Thesis submitted to Collage of
Science, Al-Nahrain University, 2008.
[9] J. Liu and M.Shih, Generalizations of pixel-value differencing steganography for data hiding in images, Elsevier
Journal on Pattern Recognition Letters, vol. 83, no. 3, pp. 319-335, 2008.



AUTHORS

Bushra Q. Al-Abudi received Ph.D. degree in Image Processing in 2002 from University of Baghdad,
College of Science, Astronomy Department. Currently she is professor in Astronomy Department and her
research interests include image and signal processing and data compression



Nisreen A. AlSaffar received B.Sc. and M. Sc. degrees in Astronomy in 2011 and 2013, respectively
from university of Baghdad, College of Science, department of Astronomy.

Das könnte Ihnen auch gefallen