Beruflich Dokumente
Kultur Dokumente
Abstract: This article proposes a novel steganography Steganography is the art and science of hiding data
scheme based on Integer Wavelet Transform and Optimal in a cover. The cover can be text, audio, image, video, etc.
Pixel Adjustment Process. The novel scheme embeds data in Divide the data hiding techniques into two groups: spatial
integer wavelet transform coefficients in an 8x8 block on the and frequency domain [1-2]. The first group is based on
cover image. The Optimal Pixel Adjustment Process (OPAP) is
embedding message in the Least Significant Bits (LSB) of
applied after embedding the message. The frequency domain is
employed to increase the robustness of the steganography
image pixels. The basic LSB method has a simple
method. The Integer wavelet transform (IWT) avoids the implementation and high capacity [3]. However, it has low
floating point precision problems of the wavelet filter. This robustness versus some attacks such as low-pass filtering
research work uses IWT and OPAP to obtain an optimal and compression [4]. A variant of LSB method can be found
mapping function to reduce the difference error between the [5] in that proposes an Optimal Pixel Adjustment Process
cover and the stego-image which increases the hiding capacity (OPAP) in which image quality of the stego-image can be
with low distortions and Peak Signal to Noise Ratio (PSNR). improved with low computational complexity. The group
finds the frequency coefficients of images and then embeds
Keywords - steganography, integer wavelet transform, the messages with them. These hiding methods overcome
optimal pixel adjustment process, peak signal to noise ratio the robustness and imperceptibility problem found in spatial
domain.
This article proposes a method to embed data in
I.INTRODUCTION
Integer Wavelet Transom coefficients using a mapping
JPEG, a standard image compression technique,
function based on Genetic Algorithm in 8x8 blocks on cover
employs Discrete Cosine Transom (DCT). Several
images and, it applies the Optimal Pixel Adjustment Process
steganography techniques for data hiding in JPEG have
after embedding the message to maximize the PSNR. This
been proposed; such as JSteg, JP Hide & Seek and
article is organized as follows: Section II Introduces the
Outguess.
proposed algorithm in detail. Section III discusses the
Most recent researches utilize Discrete Wavelet
achieved results and compares the proposed scheme with
Transform (DWT) because of its wide application in the the state of the art. Section IV concludes the artic
new image compression standard, JPEG 2000. An example
is the employment of an adaptive data embedding technique II.STEGANOGRAPHY METHOD
with the use of OPAP to hide data in Integer Wavelet
coefficients of the cover image. The application of Optimal This section describes existing embed algorithm
Pixel Adjustment Process in steganography can increase the and the proposed Optimal Pixel Adjustment Process
capacity or imperceptibility. Fard, Akbarzadeh and Varasteh (OPAP) method.
proposed a GA evolutionary process to make secure
steganography encoding on the JPEG images. Rongrong et 2.1 Integer Wavelet Transform
al introduced an optimal block mapping LSB method based
on Genetic Algorithm. The proposed algorithm employs the wavelet
transform coefficients to embed messages into four sub
bands of two dimensional wavelet transform. To avoid
problems with floating point precision of the wavelet filters,
we used Integer Wavelet Transform [6]. The Low Low (LL)
sub-band in the case of IWT appears to be a close copy with
smaller scale of the original image while in the case of
DWT the resulting LL sub band is distorted as shown in
"Fig.1”.
261
All Rights Reserved © 2013 IJARECE
ISSN: 2278 – 909X
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE)
Volume 2, Issue 3, March 2013
S1,K =(S0,2K +S0,2K+1) /2 (1) Selecting the fitness function is one of the most
important steps in designing a GA-based method. Whereas
d1, K=S0,2K+1-S0,2K (2) our GA aims to improve the image quality, Pick Signal to
Noise Ratio (PSNR) can be an appropriate evaluation test.
S0,21=S1,1d1,1/2 (3) Thus the definition of fitness function will be:
2.2.1 GA Operations Case 3 (-2k < &i < -2k-I): if pi' < 256 - 2k, then pi "= pi'
+ 2k; otherwise pi "= pi';
Mating and mutation functions are applied on
each chromosome. The mutation process causes the Pi, Pi <5 and Pi 6 are the corresponding pixel values of the
inversion of some bits and produces some new ith pixel in the three images; cover, stego and the obtained
chromosomes, then, we select elitism which means the best image by the simple LSB method, respectively. Ji (=. PiG -
chromosome will survive and be passed to the next Pi) is the embedding error between Pi and PiG. Therefore
generation. after embedding k-LSBs of Pi with k message bits, Ji will be
calculated.
2.2.2 Fitness function
2.3.1 Embedding Algorithm Step7. Calculate inverse 2D-IWT on each 8x8 block.
262
All Rights Reserved © 2013 IJARECE
ISSN: 2278 – 909X
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE)
Volume 2, Issue 3, March 2013
III.EXPERIMENTAL RESULTS
263
All Rights Reserved © 2013 IJARECE
ISSN: 2278 – 909X
International Journal of Advanced Research in Electronics and Communication Engineering (IJARECE)
Volume 2, Issue 3, March 2013
IV.CONCLUSION
National Cheng Kung University, Taiwan, May 2003.
[5] C. K. Chan and L. M. Chang, "Hiding data in images by simple LSB
This article presented a novel technique to substitution," Pattern Recognition, pp. 469-474, Mar. 2004.
increase the capacity and the imperceptibility of the image [6] El Safy, R.O, Zayed. H. H, EI Dessouki. A, "An adaptive
after embedding, and then applied the Optimal Pixel steganography technique based on integer wavelet transform,"
Adjustment Process to increase the hiding capacity of the ICNM International Conference on Networking and Media
Convergence, pp 111-117,2009.
algorithm in comparison to other systems. The drawback [7] N. Provos, P. Honeyman, "Hide and Seek: an introduction to
of this method is the execution time that can be the steganography," IEEE Computer Society, pp. 32-44, May-June
subject of our future studies to GA is employed to obtain 2003.
an optimal mapping function to reduce the error [8] K. B. Raja, Kiran Kumar. K, Satish Kumar. N, Lashmi. M. S, Preeti.
H, Venugopal. K. R. and Lalit. M. Patnaik "Genetic algorithm based
difference between the cover and the stego image and to steganography using wavelets," International Conference on
reduce the algorithm complexity to increase the PSNR Information System Security Vol. 4812, pp, 51-63. 2007.
using optimization algorithms such as genetic algorithm. [9] A.M. Fard, M.R Akbarzadeh and A. F Varasteh. "A new genetic
algorithm approach for secure JPEG steganography," International
Conference on Engineering of intelligence Systems, pp. 1 6, 2006.
REFERENCES
[10] Ji. Rongrong, Yao. Hongxun, L. Shaohui and W. Liang, "Genetic
algorithm based optimal block mapping method for LSB
[1] W. Bender, N. Morimoto, "Techniques for data hiding," IBM Sys.J. substitution," International Conference on Information Hiding and
35(3/4) (1996) 313-336. Multimedia Signal Processing, pp, 215-218, Dec 2006.
[2] K. L. Chung, C.H. Shen, L. C. Chang, "A novel SVD and VQ- based [11]A. R. Calderbank, I. Daubechies, W. Sweldens and B. Yeo.,
image hiding schem," Pattern Recognition Let. 22(9) 1051-1058 "Wavelet transforms that map integers to integers," Applied and
July 2001. Computational Harmonic Analysis, vol. 5, no. 3, pp. 332-369, July
[3] N. Wu and M. Hwang, "Data hiding: current status and key issues," 1998.
International Journal of Network Security, vol4, No.1, pp. 1-9, [12] G M. K. Ramani, E. V. Prasad, S. Varadarajan, "Steganography
Jan.2007. using BPCS to the integer wavelet transformed image "
[4] W. Chen, "A comparative study of information hiding schemes IJCSNS,Vol. 7, No.7,pp.293-302,July2007.
using amplitude, frequency and phase embedding," PhD thesis,
264
All Rights Reserved © 2013 IJARECE