Sie sind auf Seite 1von 3

Abstract-This project discusses a simple and secure II.

LITERATURE SURVEY
steganographic system involves reversible texture Literature survey is the most significant step in
synthesis and presents a design and implementation software improvement process. Before developing
of weaving a the texture synthesis process into the tool it is necessary to define the time factor
steganography to conceal the secret message. Texture economy and company power. Once these things are
synthesis is the method of building a large digital satisfied, then the next step is to define which
image from a small digital sample image by taking operating system and semantic can be used for
advantage of its structural content. A typical developing the tool. Once the programmers start
steganographic application includes covert building the tool the programmer wanta lot of
communication between two parties whose presence external support. This support can be achieved from
is anonymous to a probable attacker and whose senior programmers, from book or from websites.
success depends on detecting the existence of this Before constructing the system the above thoughts
communication. We implement how to secure the are taken into account for developing the proposed
communication over the medium. We can implement system. IN PAPER[1]A.E.Mustafa et al., presents a
patch based algorithm that may conceal source new Steganography technique based on the spatial
texture image and embeds secret message through the domain for encoding additional information in an
process of texture synthesis. picture by making small alterations to its pixels. The
proposed technique concentrations on one specific
Keywords- Steganography, stego image, Secret key, popular technique, Least Significant Bit (LSB)
Texture Synthesis, Reversible texture Synthesis Embedding. In place of using the LSB-1 of the cover
for embedding the message, LSB-2 has been used to
I. INTRODUCTION increase the robustness. In paper [2] M.Zamani et
A steganography can be defined as the art and science al.,examines the opportunity of usage of Genetic
of indistinguishable communication. The word Algorithms (GA) for data hiding in digital images.
steganography derives from the Greek steganos, Two spatial domain data hiding approaches are
implication covered or secret, and graphy, implication planned where GA is used distinctly for (i)
writing or drawing. Therefore, steganography improvement in discovery and (ii) optimum
literally means that covered writing. Information and imperceptibility of secreted data in digital pictures
communication technology has grown rapidly. respectively. In paper [3]G.S.Sarvanthi et al.,
Internet is the most general communication standard discussed a new technique of information hiding in
nowadays. But message transmission over the digital picture in spatial domain. In this technique we
internet is facing some difficulties such as files use Plane Bit Substitution Method (PBSM) technique
security, copyright control etc. So we need secret in which communication bits are embedded into the
communication methods. Steganography place an pixel value(s) of an image.In paper [4] E.Levina et
important role in information security. The origin of al., presents a nonparametric algorithm for
steganography is traced back to ancient civilization. bootstrapping a stationary unplanned ground and
The oldenEgyptians communicated covertly using the shows certain consistency possessions of the
hieroglyphic language, a sequence of symbols algorithm for the case of mixing unplanned grounds.
representative a message. The message appearances Kasithangam et al., International Journal of
as if it is a sketch of a picture although it may hold a Advanced Research in Computer Science and
hidden message. Software Engg. 6(3), March - 2016, pp. 498-501
In paper [5] Michael F.Cohen et al., discusses the
usage of Wang Tiles for picture and texture
generation as initially accessible and creating large
regions of nonperiodic texture, point circulations or
geometry can be professionally done at runtime by
assembling a tiling of the plane using a minor set of
Wang tiles. The technique contains filling a minor
set of Wang Tiles with texture, Poisson point
deliveries or geometry and non-periodically roofing
the horizontal to stochastically produce a continuous
representation.In paper [6] Hirofumi Otori et al.,
suggests a new kind of image coding technique using
texture image synthesis. The textured code delivers
the conservative bar code with an aesthetic demand
Fig 1:Steganographic Technique and is used for tagging data onto actual texture
things, which can form a basis for abundant mobile
data communications. 4.1.2 Message oriented texture synthesis process:
We have now to produce an index table and
III. PREVIOUS WORK composition image, and have pasted basis patches
The existing work in the steganography using pixel straight into the workbench. We will embed our
based technique produce the synthesized image pixel secret message through the message oriented texture
by pixel and practices spatial neighborhood synthesis to produce the final stego synthetic.
evaluations to select the most comparable pixel in a
model texture as the production pixel. Since each
production pixel is regulated by the already
synthesized pixels, an any incorrectly synthesized
pixels during the procedureinspiration the rest of the
result producing propagation of error.

IV. PROPOSED WORK


Patch based method conceals the source texture
image and embeds secret message through the Fig 3: Message oriented texture synthesis
process of texture synthesis. This allows us to extract process
the secret message and source texture from a stego
synthetic texture. The main aim of patch based 4.2 Message extraction and Message authentication
methods to embed a secret message during the procedure:
synthesizing procedure. This allows the source The message extraction for the receiver side
texture to be recovered in a message extracting containsproducing the index table, recovering the
procedure. The below Fig 2 that will show the source texture, performance the consistency synthesis
proposed system architecture. and removing and authenticating the secret message
hidden in the stego synthetic texture. Given the secret
key believed in the receiver side, the same index
table as the embedding technique can be produced.

Kasithangam et al., International Journal of


Advanced Research in Computer Science and
Software Engg.

Fig 4: Message extraction andauthentication


Fig 2: Proposed Steganographic system process
architecture
V. EXPERIMENTAL RESULTS
4.1 Message embedding process: Our algorithm covers the source texture image and
4.1.1 Patch composition process: The second embeds secret message concluded the process of
procedure of our algorithm is to paste the source texture synthesis. This permits us to extract the secret
patches into a workbench to create a composition message and source texture from a stego synthetic
image. First we found a blank image as our texture using message extraction and authentication
workbench where the dimension of the workbench is procedure.
equivalent to the synthetic texture. By mentioning to
the source patch IDs deposited in the index table, we
then paste the basis patches into the workbench.
VI. CONCLUSION
Given an original source texture,our system can
produce a huge stego synthetic texture covering
secret messages. To the best of our information, we
are the first that can exquisitely weave the
steganography into a predictable patch based texture
synthesis. Our technique is novel and delivers
reversibility to retrive the innovative source texture
from the stego synthetic texture, creationimaginable a
second round of texture synthesis if desired. The
accessible
Kasithangam et al., International Journal of
Advanced Research in Computer Science and
Software Engg. 6(3), March - 2016, pp. 498-501
2016, IJARCSSE All Rights Reserved
Page | 501
algorithm is protected and strong against an RS
steganalysis attack. We belive our proposed
arrangementproposals substantial benefits and
delivers an occasionto spread steganography
application.
REFERENCES [1] A. A. Efros and T. K. Leung,
(Sep.1999) Texture synthesis by non-parametric
sampling,. [2] X. Li, B. Li, B. Yang, and T. Zeng,
(Jun.2013) General framework to histogramshifting-
based reversible data hiding,. [3] A. A. Efros and W.
T. Freeman, (2001) Image quilting for texture
synthesis and transfer,. [4] L. Liang, C. Liu, Y.-
Q.Xu, B. Guo, and H.-Y. Shum, (2001) Real-time
texture synthesis by patch-based sampling,. [5] M.
F. Cohen, J. Shade, S. Hiller, and O. Deussen, (2003),
Wang tiles for image and texture generation, . [6]
H. Otori and S. Kuriyama, (2007) Data-embeddable
texture synthesis,.

Das könnte Ihnen auch gefallen