Beruflich Dokumente
Kultur Dokumente
steganography hides the existence of the message, steganography but most of the people are not able to
secret message is not difficult to decode in case of detect the presence of the message.[4]
Types of Steganography
Steganography
PREPROCESSING
The method of preprocessing in the propose solution is to remove noise from image. Noise particles may come in
sight due to grey scale variation in image. De-noising of image is necessary because noise can affect the final
results. So apply proper filter, median filter is applied because the results are efficient. To check its efficiency, we
will add noise to image first by using ‘add noise’ command.
There are different types of filters. Like linear filters and non-linear filters, adaptive filters, Gaussian filter among all
median filter works better. It is a non-linear filter mainly used for noise removal without disturbing the image. It is
more robust and retains maximum information of the image. It is widely used in digital image processing because in
many conditions while removing noise it prevents boundaries. It performs better than other filters. Command used
for median filter is ‘medfilt’.
ENHANCEMENT
While removing noise, some parts of the images become blur. So to improve the visual appearance of the image,
enhancement is applied. There are different techniques; among all histogram equalization is better. Histogram
equalization usually increases the contrast of foreground and background of image, both are bright or both are dark.
‘histeq’ command will be used for this function.
generally sensitive to changes in such sub-bands. This allows the watermark to be embedded without being
perceived.
The wavelet transform is computed separately for different segments of the time-domain signal at different
frequencies. Multi-resolution analysis: analyzes the signal at different frequencies giving different resolutions. Good
for signal having high frequency components for short durations and low frequency components for long
duration.e.g. Images and video frames. Wavelet transform decomposes a signal into a set of basic functions. These
basis functions are called wavelets.
(a) Original image (b) 1st level DWT (c) 2nd level DWT
ENCODING PROCESS
In this process firstly read video. Convert video onto frames. Select random frames and compressed frames by DWT
domain. Then secret image convert into binary. Secret image embedding into compressed frames using bit exoring.
Applied DWT
Enter embedded
secret key
Embedding secret
into frames
Applied IDWT
Embedded video
with secret image
Embedded data retrieved: After compilation, the embedded image as well as the secret data is retrieved at the end
of the process. Original video and embedded video both are identical and change cannot be seen through naked eye.
Retrieve text key and image: Retrieved Embedded message is in text a image using the same way with encryption
algorithm.
Retrieve the original video file: After conversion, original video file is retrieved and it can be checked by playing
that video file in Matlab.
Steps of decoding:
Step2. Covert video into frames and separate frames in which image is embedding.
Enter Extraction
key
Figure 7 shows dialogue box to enter Secret key for Fig.no.8 video on embedding image with secret key.
the purpose of embedding. Secret key will be the key
we have to share with the person we are sending Figure 9 shows Extracted secret image. Extracted
secret data hidden in video. Secret key must be same secret image will appear in axis box.
if we have to extract image.
NO. OF PSNR VALUE MSE VALUE Journal of Computer Science and Security
IMAGES (IJCSS) (2009).
IMAGE 1 65.8712 0.016957 [3] Zamani, Mazdak, et al. "An approach to
IMAGE 2 64.6984 0.022215 improve the robustness of substitution
IMAGE 3 67.7642 0.010966 techniques of audio
IMAGE 4 61.81 0.043199 steganography." Computer Science and
IMAGE 5 65.5181 0.018394 Information Technology, 2009. ICCSIT
IMAGE 6 62.8136 0.034286 2009. 2nd IEEE International Conference
IMAGE 7 56.5943 0.14357 on. IEEE, (2009).
IMAGE 8 57.8434 0.10768 [4] Sherly, A. P., and P. P. Amritha. "A
compressed video steganography using
Table 1:- Table For Calculation of PSNR & MSE
values TPVD." International Journal of Database
Management Systems (IJDMS) (2010).
V. CONCLUSION & FUTURE SCOPE [5] Altaay, Alaa A. Jabbar, and Shahrin bin
Sahib. "An introduction to image
Implementation of DWT and LSB of hiding secret steganography techniques." Advanced
image into video in Steganography is new technique Computer Science Applications and
and we found results using different images i.e. secret Technologies (ACSAT), 2012 International
images (original image) and extracted image are Conference on. IEEE, (2012).
different. We conclude that DWT using filters (high [6] Kansal, Manie, Gursharanjeet Singh, and B.
pass and low pass) which increase capacity, security, V. Kranthi. "DWT, DCT and SVD based
Imperceptibility and decrease noise. In this generate digital image watermarking." Computing
secret key for embedding which provides large Sciences (ICCS), 2012 International
secrecy. It shows that DWT and LSB performance is Conference on. IEEE, (2012).
better than of DCT. Also the new technique which is [7] Prabakaran, G., and R. Bhavani. "A
now implemented is more secure and robust than modified secure digital image steganography
previous implemented technique. In this research based on Discrete Wavelet
work we have implemented the design using DWT Transform." Computing, Electronics and
algorithm and LSB technique with GUI tool of Electrical Technologies (ICCEET), 2012
MATLAB. In this research work we took number of International Conference on. IEEE, (2012).
images for experiment. In future one can use some [8] Sathya, V., et al. "Data hiding in audio
other technique to implement same design and signal, video signal text and JPEG
calculate parameters MSE and PSNR. Someone can images." Advances in Engineering, Science
also add some better attractive GUI design. and Management (ICAESM), 2012
International Conference on. IEEE, (2012).
REFERENCES [9] Bodhak, Poonam V., and Baisa L. Gunjal.
"Improved protection in video
[1] Reddy, HS Manjunatha, and K. B. Raja. Steganography using DCT &
"High capacity and security steganography LSB." International journal of engineering
using discrete wavelet and innovative technology (IJEIT)(2012).
transform." International Journal of [10] Dasgupta, Kousik, J. K. Mandal, and
Computer Science and Security (IJCSS) ParamarthaDutta. "Hash based least
(2009). significant bit technique for video
[2] Nag, Amitava, et al. "A Novel Technique steganography (HLSB)." International
for Image Steganography Based on DWT Journal of Security, Privacy and Trust
and Huffman Encoding." International Management (IJSPTM) (2012).
[11] Jain, Nitin, SachinMeshram, and [19] Suneetha, B., CH HIMA BINDU, and S.
ShikhaDubey. "Image Steganography Using SARATH CHANDRA. "Secured data
LSB and Edge–Detection transmission based video
Technique." International Journal of Soft steganography." IEEE International Journal
Computing and Engineering (IJSCE) (2012). of Mechanical and Production Engineering
[12] Swathi, A., and Dr SAK Jilani. "Video (IJMPE) (2013).
Steganography by LSB Substitution Using [20] Mamtajuneja,Parinder Singh Sandhu.
Different Polynomial “Information Hiding using improved LSB
Equations." international Journal Of steganography and Feature Detection
Computational Engineering Research technique” International journal of
(IJCER) (2012). Engineering and Advanced Technology
[13] Laskar, Shamim Ahmed, and (IJEAT) (2013).
KattamanchiHemachandran. "High Capacity
data hiding using LSB Steganography and
Encryption." International Journal of
Database Management Systems (IJDMS)
(2012).
[14] Bhole, Ashish T., and Rachna Patel.
"Steganography over video file using
Random Byte Hiding and LSB
technique." Computational Intelligence &
Computing Research (ICCIC), 2012 IEEE
International Conference on. IEEE, (2012).
[15] Paulpandi, P., and Dr T. Meyyappan.
"Hiding Messages Using Motion Vector
Technique in Video
Steganography." International Journal of
Engineering Trends and Technology,
Volume3, Issue3 (2012).
[16] Sadiq, Ahmed T., and Wafaa M. Salih.
"Uncompressed video quality metric based
on watermarking
technique." Communications Signal
Processing, and their Applications
(ICCSPA), 2013 1st International
Conference on. IEEE, (2013).
[17] Bhautmage, Pritish, AmuthaJeyakumar, and
AshishDahatonde. "Advanced Video
Steganography Algorithm." International
Journal of Engineering Research and
Applications (IJERA) Vol 3 (2013).
[18] S.Saejung ,A.Boondee. “On Comparison of
Digital Image Steganography Algorithm
Based on DCT and Wavelet” International
Computer Science and Engineering
Conference (ICSEC) (2013).