Beruflich Dokumente
Kultur Dokumente
National Conference on Advanced Technologies in Computer Science & Information Technology (NCATCSIT 2015)
Organized by
Dept. of CSE & Dept. of R&D, Geethanjali Institute of Science & Technology, A.P, India
INTRODUCTION
With the continual immeasurable evolution of computer networks, digital media replication is largely becoming a
cause of concern; one of the major reasons being lack of effective intellectual property protection. If such a system is in
place, then unauthorized copying and distribution can be laid to rest. In recent years, technology has empowered majority
of information involving sound, image or video to be stored in digital form. Digital media opens up newer avenues to an
average user. Digital media allows multiple digital coping and also, easy modification of its content. Another crucial
factor that also contributed to the increase of piracy is the free and untroubled traffic of information over the World Wide
Web (www). Nowadays, surfing through the internet using web browsers or acquiring information, downloading
multiple multimedia files through different search engines does not demand extraordinary skills. This beckoned an
increasing interest in the area of digital steganography as a counter measure. The Science of Concealing Information
was later to be known as Steganography [1-8]. Steganography is used for the invisible embedding of information in the
host data, with the intent information stored and transmitted together with the host data, thus retaining secret information.
Steganography can be employed with several mediums like Image, Text, Audio, Video etc. [2]. In this paper, image
steganography is implemented because of its high frequency use on internet and in our day-to-day life. Image
steganography can be implemented in spatial or frequency domain. In this paper, the proposed algorithm for Image
Steganography uses a hybrid technique which is the combination of three techniques in frequency domain. The proposed
technique combines the properties of techniques- DWT, DCT and SVD. A comparative analysis of the proposed
algorithm is done with another hybrid technique in frequency domain which is the hybrid combination of two
techniques- DWT and SVD. The comparison is made in terms of their performance to sustain to attack.
The basic layout of the image steganography system is depicted in figure 1. The host or cover image in which the
watermark or secret image is hidden is referred as Watermarked image, which should appear visibly same as that of the
Copyright @ IJIRCCE
www.ijircce.com
68
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
National Conference on Advanced Technologies in Computer Science & Information Technology (NCATCSIT 2015)
Organized by
Dept. of CSE & Dept. of R&D, Geethanjali Institute of Science & Technology, A.P, India
original host image. The major requirement of the system is to hide a watermark image into a cover image such that
anyone cannot even predict that there exists some image as secret information into the cover image. Only the intended
recipient should be able to extract the secret information from the watermarked image. Now, while transmitting the
watermarked image to the desired destination, some undesired attack may cause degradation of the image. So, system
should be designed such that it should be able to sustain the attacks.
Noise attack
Cover
Image
Embed
Watermark
Watermarked
Image
Degraded
Watermarked
Image
Detect
Watermark
Image
Watermark
Image
Imperceptibility:
A watermark embedding procedure in steganography is truly imperceptible if the naked eye cannot visualize the
inserted watermark into the host image. Ideally, no perceptible difference between the watermarked and original signal
should exist. However, even the minimal alteration in the cover image may become apparent when the watermarked
image is compared directly with the cover image. Therefore, the modifications in the cover image must go unnoticed by
Copyright @ IJIRCCE
www.ijircce.com
69
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
National Conference on Advanced Technologies in Computer Science & Information Technology (NCATCSIT 2015)
Organized by
Dept. of CSE & Dept. of R&D, Geethanjali Institute of Science & Technology, A.P, India
the viewer for which we have designed a hybrid technique using three techniques in frequency domain- DWT, DCT
and SVD [1] [2] [3] [5]. In this paper we exercise the performance characteristic Peak Signal to Noise Ratio, often
abbreviated PSNR [1] [3] to indicate the transparency degree. PSNR is used as an approximation to human perception
of reconstruction quality. PSNR can be calculated by MSE (Mean Squared Error) [2] [3]. It is nothing but the
comparison between each pixel to pixel of the embedded image and the cover image.
eq. (1)
eq. (2)
where MAX is the maximum possible pixel value of the image. When the pixels are represented using 8 bits per
sample, MAX value is 255. More generally, when samples are represented using linear PCM with B bits per sample,
MAX is 2B1.
Capacity:
Capacity is also known as payload of the image steganography system. It refers to the amount of watermark
information that can be hidden in a cover image without affecting the quality of the underlying cover image. Capacity
requirement always struggle against two other important requirements, that is, imperceptibility and robustness which is
shown in Figure 2. A higher capacity is generally obtained at the expense of either robustness strength or
imperceptibility, or both.
Robustness
Capacity
Imperceptibility
Fig. 2 Trade-off between Robustness, Imperceptibility and Capacity [4]
Robustness:
Robustness of the image steganography system accounts for the capability of the watermark to survive signal
manipulations. Apart from malicious attacks, common signal processing operations can pose a threat to the detection of
watermark, thus making it desirable to design an image steganography system that can survive those operations. In
general, there should be no way in which the watermark can be removed or altered without sufficient degradation of the
perceptual quality of the host data so as to render it unusable. In this paper, we have employed Normalized Correlation
(NC) [1] to measure the robustness of the watermark. It is given by:
eq. (3)
Copyright @ IJIRCCE
www.ijircce.com
70
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
National Conference on Advanced Technologies in Computer Science & Information Technology (NCATCSIT 2015)
Organized by
Dept. of CSE & Dept. of R&D, Geethanjali Institute of Science & Technology, A.P, India
IV. PROPOSED ALGORITHM
a. Design Considerations:
The Image Steganography has been implemented using MATLAB 2013a software on Windows 8.1 operating
system.
The color Cover image taken is of size 512x512 and the watermark image selected is of 64x64 in size.
b. Description of the Proposed Algorithm:
Aim of the proposed algorithm is to maximize the robustness of the system against different types of attacks over
the watermarked image. The proposed algorithm consists of three main steps.
www.ijircce.com
71
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
National Conference on Advanced Technologies in Computer Science & Information Technology (NCATCSIT 2015)
Organized by
Dept. of CSE & Dept. of R&D, Geethanjali Institute of Science & Technology, A.P, India
S2 = U * S1 * VT
Step 10: Replace the original DC matrix coefficients with the modified new components.
Step 11: Apply inverse DCT and then inverse DWT.
Step 12: Recombine the RGB components and the watermarked image is formed.
B.
Watermark Extracting Algorithm:
Step 1: Convert the watermarked image into RGB color spaces.
Step 2: Apply DWT to decompose the cover image in which watermark is hidden.
Step 3: Divide middle frequency band into smaller 4x4 blocks and apply DCT to each block.
Step 4: Extract the DC coefficients from every DCT transformed blocks and construct a new matrix C, which could
be decomposed by SVD technique.
Step 5: Extract the singular values from C matrix, and then compare the difference between the watermarked
singular values and host image singular values.
Step 6: Combine the obtained singular values with the orthogonal matrices of watermark. The watermark is
extracted.
V. SIMULATION RESULTS
The proposed image steganography algorithm is implemented with Graphical User Interface (GUI) designed in
MATLAB 2013a.The simulation study involves calculation of PSNR and NC values while embedding and extracting
the watermark image respectively for both the hybrid techniques. Proposed algorithm which is the combination of three
techniques DWT-DCT-SVD is compared with the hybrid technique obtained by the combination of two techniques in
frequency domain- DWT-SVD [4] in terms of PSNR and NC values. We considered the same images of same size to
evaluate the performance of both the hybrid techniques. Selected embedding intensity value () is 0.25 and the results
shown are implemented with HL band obtained by applying DWT technique over cover image.
Without attack:
Table I: PSNR (in dB) and NC values for hybrid technique using DWT-DCT-SVD in HL band without attack
DWT-DCT-SVD
Cover image
Watermark
PSNR (dB)
36.8469
Copyright @ IJIRCCE
NC
Watermarked
Image
Extracted
Watermark
0.998921
www.ijircce.com
72
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
National Conference on Advanced Technologies in Computer Science & Information Technology (NCATCSIT 2015)
Organized by
Dept. of CSE & Dept. of R&D, Geethanjali Institute of Science & Technology, A.P, India
Table II: PSNR (in dB) and NC values for hybrid technique using DWT-SVD in HL band without attack
DWT -SVD
Cover image
Watermark
PSNR (dB)
35.1997
Watermarked
Image
NC
Extracted
Watermark
0.998981
With attack:
The information about robustness of the system to different attacks is obtained from Normalized Correlation values
between original and extracted watermark image. The robustness of both the hybrid techniques using DWT-DCT-SVD
and DWT-SVD have been tested against three types of attacks over the same cover and watermark image. The
comparative analysis of the performance of both the hybrid techniques is as shown in the table III.
Table III: Comparative analysis of both the hybrid techniques without attack
DWT-DCT-SVD
DWT-SVD
PSNR
NC
PSNR
NC
36.8469
0.998921
35.1997
0.998981
30.7657
0.997639
29.7462
0.981333
33.1021
0.997788
30.9958
0.986613
Kirti D. Nagpal, Prof. D. S. Dabhade, Analysis of Wavelet Based Digital Image Steganography using Hybrid Technique in Frequency
Domain, International Journal on Recent and Innovation Trends in Computing and Communication, Volume: 3 Issue: 2, February 2015
Kirti D. Nagpal, Prof. D. S. Dabhade, A Survey on Image Steganography & its Techniques in Spatial & Frequency Domain, International
Journal on Recent and Innovation Trends in Computing and Communication, Volume: 3 Issue: 2, February 2015
Copyright @ IJIRCCE
www.ijircce.com
73
ISSN(Online): 2320-9801
ISSN (Print): 2320-9798
National Conference on Advanced Technologies in Computer Science & Information Technology (NCATCSIT 2015)
Organized by
Dept. of CSE & Dept. of R&D, Geethanjali Institute of Science & Technology, A.P, India
S. Rawat, Sneha M. Shivamkutty, A Novel Digital Image Watermarking Using Hybrid Technique, VESIT , International Technological
Conference-2014 (I-TechCON), Jan. 03 04, 2014
4.
N. Anil Kumar, M. Haribabu, Ch. Hima Bindu, Novel Image Watermarking Algorithm with DWT-SVD, International Journal of Computer
Applications, November 2014
5. Alina Menoth, Steape Monis, Maria George, Sneha Shivamkutty, A Survey on Watermarking of Images Using Hybrid Techniques, VESIT,
International Technological Conference-2014
6. Asha Pathak, Vrushali Bhuyar, Image Steganography and Steganalysis: A Survey, International Journal of scientific research and
management, Volume 2, Issue 12
7. Gurmeet Kaur, Aarti Kochhar, Transform Domain Analysis of Image Steganography, International Journal for Science and Emerging
Technologies with Latest Trends, April 2013
8. M.Vijay , V.VigneshKumar, Image Steganography Method Using Integer Wavelet Transform, International Journal of Innovative Research in
Science, Engineering and Technology, Volume 3, Special Issue 3, March 2014
9. Anne Kayem, Christoph Meinel, Information Security in Diverse Computing Environments
10. Chris Solomon, Toby Breckon, Fundamentals of Digital Image Processing : A Practical Approach with Examples in Matlab, 2010
11. Anil K Jain, Fundamentals of Digital Image Processing, University of California-Davis, Prentice Hall, 1988
3.
Copyright @ IJIRCCE
www.ijircce.com
74