Sie sind auf Seite 1von 4

ISSN: 2278 – 909X

International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE)


Volume 2, Issue 3, March 2013

Steganographic Method Image Security Based on Optimal Pixel Adjustment


Process and Integer Wavelet Transform
N.Vinothkumar1, T.Vigneswaran2
PG scholor1,Professor/ECE Dept2
Saveetha Engineering College, Chennai

Abstract: This article proposes a novel steganography Steganography is the art and science of hiding data
scheme based on Integer Wavelet Transform and Optimal in a cover. The cover can be text, audio, image, video, etc.
Pixel Adjustment Process. The novel scheme embeds data in Divide the data hiding techniques into two groups: spatial
integer wavelet transform coefficients in an 8x8 block on the and frequency domain [1-2]. The first group is based on
cover image. The Optimal Pixel Adjustment Process (OPAP) is
embedding message in the Least Significant Bits (LSB) of
applied after embedding the message. The frequency domain is
employed to increase the robustness of the steganography
image pixels. The basic LSB method has a simple
method. The Integer wavelet transform (IWT) avoids the implementation and high capacity [3]. However, it has low
floating point precision problems of the wavelet filter. This robustness versus some attacks such as low-pass filtering
research work uses IWT and OPAP to obtain an optimal and compression [4]. A variant of LSB method can be found
mapping function to reduce the difference error between the [5] in that proposes an Optimal Pixel Adjustment Process
cover and the stego-image which increases the hiding capacity (OPAP) in which image quality of the stego-image can be
with low distortions and Peak Signal to Noise Ratio (PSNR). improved with low computational complexity. The group
finds the frequency coefficients of images and then embeds
Keywords - steganography, integer wavelet transform, the messages with them. These hiding methods overcome
optimal pixel adjustment process, peak signal to noise ratio the robustness and imperceptibility problem found in spatial
domain.
This article proposes a method to embed data in
I.INTRODUCTION
Integer Wavelet Transom coefficients using a mapping
JPEG, a standard image compression technique,
function based on Genetic Algorithm in 8x8 blocks on cover
employs Discrete Cosine Transom (DCT). Several
images and, it applies the Optimal Pixel Adjustment Process
steganography techniques for data hiding in JPEG have
after embedding the message to maximize the PSNR. This
been proposed; such as JSteg, JP Hide & Seek and
article is organized as follows: Section II Introduces the
Outguess.
proposed algorithm in detail. Section III discusses the
Most recent researches utilize Discrete Wavelet
achieved results and compares the proposed scheme with
Transform (DWT) because of its wide application in the the state of the art. Section IV concludes the artic
new image compression standard, JPEG 2000. An example
is the employment of an adaptive data embedding technique II.STEGANOGRAPHY METHOD
with the use of OPAP to hide data in Integer Wavelet
coefficients of the cover image. The application of Optimal This section describes existing embed algorithm
Pixel Adjustment Process in steganography can increase the and the proposed Optimal Pixel Adjustment Process
capacity or imperceptibility. Fard, Akbarzadeh and Varasteh (OPAP) method.
proposed a GA evolutionary process to make secure
steganography encoding on the JPEG images. Rongrong et 2.1 Integer Wavelet Transform
al introduced an optimal block mapping LSB method based
on Genetic Algorithm. The proposed algorithm employs the wavelet
transform coefficients to embed messages into four sub
bands of two dimensional wavelet transform. To avoid
problems with floating point precision of the wavelet filters,
we used Integer Wavelet Transform [6]. The Low Low (LL)
sub-band in the case of IWT appears to be a close copy with
smaller scale of the original image while in the case of
DWT the resulting LL sub band is distorted as shown in
"Fig.1”.

261
All Rights Reserved © 2013 IJARECE
ISSN: 2278 – 909X
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE)
Volume 2, Issue 3, March 2013

S1,K =(S0,2K +S0,2K+1) /2 (1) Selecting the fitness function is one of the most
important steps in designing a GA-based method. Whereas
d1, K=S0,2K+1-S0,2K (2) our GA aims to improve the image quality, Pick Signal to
Noise Ratio (PSNR) can be an appropriate evaluation test.
S0,21=S1,1d1,1/2 (3) Thus the definition of fitness function will be:

S0,21+1 + S1,1+d1,K /2 (4)


MxNx2552
PSNR  10log10 (9)
Then the inverse transform can be calculated by:
These equations should be in 2D in order to be applied on I,J (yi, j  xi, j )2
images. Simple 2D transform has employed in this paper
and it can be computed for an image [11].
Where M and N are the image sizes and, x and y are the
image intensity values before and after embedding.
Ai,j =(I2i,2j+I2i,2j) /2 (5)
2.3 Proposed OPAP algorithm
Hi,j = I2i,2j+1-I2i,2j (6)
The main idea of applying OPAP is to minimize
Vi,j =I2i,2j+1-I2i,2j (7) the error between the cover and the stego image. For
example if the pixel number of the cover is 10000 (decimal
number16) and the message vector for 4 bits is 1111, then
Di,j =I2i,2j+1-I2i,2j (8) the pixel number will change to 11111 (decimal number 31)
and the embedding error will be IS, while after applying
2.2 Genetic Algorithm OPAP algorithm the fifth bit will be changed from 1 to 0,
and the embedding error is reduced to 1.
This method embeds the message inside the cover
with the least distortion therefore we have to use a mapping The OPAP algorithm can be described as follows:
function to LSBs of the cover image according to the
content of the message. We use Genetic Algorithm to find a Case 1 (2k-I < &i < 2k): if pi'2: 2k, then pi " = pi'-2k
mapping function for all the image blocks. Block based otherwise pi" = pi';
strategy can preserve local image property and reduce the
algorithm complexity compared to single pixel substitution. Case 2 (-2k-I < &i < 2k-I): pi " = pi';

2.2.1 GA Operations Case 3 (-2k < &i < -2k-I): if pi' < 256 - 2k, then pi "= pi'
+ 2k; otherwise pi "= pi';
Mating and mutation functions are applied on
each chromosome. The mutation process causes the Pi, Pi <5 and Pi 6 are the corresponding pixel values of the
inversion of some bits and produces some new ith pixel in the three images; cover, stego and the obtained
chromosomes, then, we select elitism which means the best image by the simple LSB method, respectively. Ji (=. PiG -
chromosome will survive and be passed to the next Pi) is the embedding error between Pi and PiG. Therefore
generation. after embedding k-LSBs of Pi with k message bits, Ji will be
calculated.
2.2.2 Fitness function
2.3.1 Embedding Algorithm Step7. Calculate inverse 2D-IWT on each 8x8 block.

The following steps explain the embedding 2.3.2 Extraction Algorithm


process: The extraction algorithm consists of four steps as
Step1. Divide the cover image into 8x8 blocks. follows:
Step2. Find the frequency domain representation of blocks Step1. Divide the cover image into 8x8 blocks.
by 2D Integer Wavelet Transform and get four sub bands Step2. Extract the transform domain coefficient by 2D-
LLl, HLl, LHI, and HHI. IWT of each 8x8 block.
Step3. Image containing the pixels numbers of each 8x8 Step3. Employ the obtained mapping function in the
blocks as the mapping function. embedding phase and find the pixel sequences for
Step4. Embed the message bits in 4-LSBs IWT extracting.
coefficients each pixel according to mapping function. Step4. Extract 4-LSBs in each pixel.
Step5. Fitness evaluation is performed to select the best
mapping function.
Step6. Apply Optimal Pixel Adjustment Process on the
image.

262
All Rights Reserved © 2013 IJARECE
ISSN: 2278 – 909X
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE)
Volume 2, Issue 3, March 2013

III.EXPERIMENTAL RESULTS

The proposed method is applied on SI2xSI2 8-bit


gray scale images "Rose" and "Lena". The simulation is Table II. Comparison of Capacity and PSNR
performed on 2.SGHZ Core 2 Duo processor, 4GB RAM obtained from existing method and the proposed
and Windows Vista OS and Matlab7.6. The messages are method
generated randomly with the same length as the maximum Cover Method Max.H.C Max. PSNR
hiding capacity. Table I shows the stego image quality by Image (bits) H. C. (dB)
PSNR. Human visual system is unable to distinguish the (%)
gray scale images with PSNR more than 3S dB. This article Lena Proposed 1048576 50% 35.17
embedded the messages in the 4-LSBs and received a Method
reasonable PSNR. "Fig. 3" shows the images after and Adaptive
before embedding. Stegnographic 986408 47% 31.8
based IWT[9]
Rose Proposed 1048576 50% 36.23
Method
Adaptive
Stegnographic 1008593 48% 30.89
based IWT[9]

Fig.2 Lena image after embedding 3-LSBs and 4-LSBs

Fig.3 Rose image after embedding 3-LSBs and 4-LSBs

Table I. Capacity and PSNR obtained for 4-LSBs


and 5-LSBs

Cover Hiding PSNR(Db.)


Image Capacity(Bits)

Lena 1048576 35.17


(4LSBs)

1310720 (5- 29.08


LSBs) Figure3. (a) Histogram of Lena image before
embedding (b) Histogram of Lena image after
Rose 1048576(4- 36.23 embedding 3-LSBs (c) Histogram of Lena
LSBs)10 image after 4-LSBs (d) Histogram of Lena after
embedding 5-LSBs.
1310720(5- 29.49
LSBs)

263
All Rights Reserved © 2013 IJARECE
ISSN: 2278 – 909X
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE)
Volume 2, Issue 3, March 2013

IV.CONCLUSION
National Cheng Kung University, Taiwan, May 2003.
[5] C. K. Chan and L. M. Chang, "Hiding data in images by simple LSB
This article presented a novel technique to substitution," Pattern Recognition, pp. 469-474, Mar. 2004.
increase the capacity and the imperceptibility of the image [6] El Safy, R.O, Zayed. H. H, EI Dessouki. A, "An adaptive
after embedding, and then applied the Optimal Pixel steganography technique based on integer wavelet transform,"
Adjustment Process to increase the hiding capacity of the ICNM International Conference on Networking and Media
Convergence, pp 111-117,2009.
algorithm in comparison to other systems. The drawback [7] N. Provos, P. Honeyman, "Hide and Seek: an introduction to
of this method is the execution time that can be the steganography," IEEE Computer Society, pp. 32-44, May-June
subject of our future studies to GA is employed to obtain 2003.
an optimal mapping function to reduce the error [8] K. B. Raja, Kiran Kumar. K, Satish Kumar. N, Lashmi. M. S, Preeti.
H, Venugopal. K. R. and Lalit. M. Patnaik "Genetic algorithm based
difference between the cover and the stego image and to steganography using wavelets," International Conference on
reduce the algorithm complexity to increase the PSNR Information System Security Vol. 4812, pp, 51-63. 2007.
using optimization algorithms such as genetic algorithm. [9] A.M. Fard, M.R Akbarzadeh and A. F Varasteh. "A new genetic
algorithm approach for secure JPEG steganography," International
Conference on Engineering of intelligence Systems, pp. 1 6, 2006.
REFERENCES
[10] Ji. Rongrong, Yao. Hongxun, L. Shaohui and W. Liang, "Genetic
algorithm based optimal block mapping method for LSB
[1] W. Bender, N. Morimoto, "Techniques for data hiding," IBM Sys.J. substitution," International Conference on Information Hiding and
35(3/4) (1996) 313-336. Multimedia Signal Processing, pp, 215-218, Dec 2006.
[2] K. L. Chung, C.H. Shen, L. C. Chang, "A novel SVD and VQ- based [11]A. R. Calderbank, I. Daubechies, W. Sweldens and B. Yeo.,
image hiding schem," Pattern Recognition Let. 22(9) 1051-1058 "Wavelet transforms that map integers to integers," Applied and
July 2001. Computational Harmonic Analysis, vol. 5, no. 3, pp. 332-369, July
[3] N. Wu and M. Hwang, "Data hiding: current status and key issues," 1998.
International Journal of Network Security, vol4, No.1, pp. 1-9, [12] G M. K. Ramani, E. V. Prasad, S. Varadarajan, "Steganography
Jan.2007. using BPCS to the integer wavelet transformed image "
[4] W. Chen, "A comparative study of information hiding schemes IJCSNS,Vol. 7, No.7,pp.293-302,July2007.
using amplitude, frequency and phase embedding," PhD thesis,

264
All Rights Reserved © 2013 IJARECE

Das könnte Ihnen auch gefallen