Beruflich Dokumente
Kultur Dokumente
Piyush Gupta
M.Tech. [Embedded System Technology]
Amity University
Abstract
The transfer of images over the internet has led to a security concern where confidential
images need to be protected from unauthorised access. In the growing technological era,
almost everyone shares his/her personal information including images over the internet
with other users or to a database repository which attract hackers to take undue advantage
from this information. Security provided to images like blue print of company projects,
secret images of concern to the army or of company’s interest using image processing
techniques have proven to be beneficial. In this work, two steganographic methods i.e.
LSB and DWT are combined with Arnold Transformation. The results of Arnold
transformed LSB and DWT images are analysed and compared on the basis of image
quality parameters. Our focus is to scramble the image information to a level where it
becomes difficult for intruder to get actual transferred image.
Contents
Abstract..........................................................................................................................................1
List of Figures................................................................................................................................4
Chapter 1.......................................................................................................................................5
Introduction...................................................................................................................................5
1.1 Image Processing...................................................................................................................5
1.2 Applications of Image Processing..........................................................................................6
1.3 Issues in Image Processing....................................................................................................7
1.3.1 Image Compression........................................................................................................7
1.3.2 Image Enhancement.......................................................................................................7
1.3.3 Image Security................................................................................................................7
1.3.4 Image Recognition.........................................................................................................8
1.3.5 Image Visualization........................................................................................................8
1.4 Image Security.......................................................................................................................8
1.5 Techniques used for Image Security......................................................................................9
1.6 Motivation of the work.......................................................................................................10
1.7 Project Outline....................................................................................................................10
Literature Survey........................................................................................................................12
2.1 Advanced Encryption Standard and Least Significant Bit Algorithm....................................12
Figure 2.1 AES encryption algorithm.............................................Error! Bookmark not defined.
2.2 Encryption using Discrete Cosine Transform (DCT).............................................................13
2.3 Reversible Data Hiding Technique.......................................................................................13
2.4 Haar Discrete Wavelet Transform.......................................................................................14
2.5 Data Encryption Standard (DES) Algorithm.........................................................................16
2.6 Secret Fragment Visible Mosaic Image................................................................................16
2.7 Modified Advanced Encryption Standard............................................................................18
2.8 Arnold Transformation........................................................................................................19
2.9 Conclusion of Literature Survey..........................................................................................20
Chapter 3.....................................................................................................................................21
Project Objective.........................................................................................................................21
3.1 Problem Statement.............................................................................................................21
3.2 Project Objective.................................................................................................................21
Chapter 4.....................................................................................................................................22
Secure Information Hiding.........................................................................................................22
4.1 Arnold’s cat map.................................................................................................................22
4.1.1 Properties of Arnold Transformation (Γ)......................................................................23
4.2 Least-Significant Bit (LSB) Technique...................................................................................24
4.2.1 LSB Embedding Process..............................................................................................26
4.2.2 LSB Extraction Process................................................................................................26
4.3 Discrete Wavelet Transform (DWT) Technique...................................................................27
4.3.1 DWT Embedding Procedure.........................................................................................28
4.3.2 DWT Extraction Procedure..........................................................................................29
Chapter 5.....................................................................................................................................31
Implementation, Results and Discussion...................................................................................31
5.1 Block Diagram of Proposed Work........................................................................................31
5.2.4 Comparison of timings of Arnold-LSB vs. Arnold-DWT.............................................41
......................................................................................................................................................41
5.3 Discussion............................................................................................................................41
Chapter 6.....................................................................................................................................43
Conclusion...................................................................................................................................43
References....................................................................................................................................44
List of Figures
Figure 1 Two-Level Security Mechanism.....................................................................................10
Figure 2 AES encryption algorithm..............................................................................................12
Figure 3 Detailed 2D Haar Wavelet Transform.............................................................................15
Figure 4 Example of 2D Haar Wavelet Transform........................................................................15
Figure 5 Flow diagram of mosaic image approach........................................................................17
Figure 6 Hybrid Approach for Image Security..............................................................................18
Figure 7 Conceptual Diagram of Arnold-LSB Technique.............................................................19
Figure 8 Arnold Transformation on a Grey Scale Cameraman Image...........................................23
Figure 9 LSB Steganographed Image............................................................................................25
Figure 10 LSB Insertion Mechanism.............................................................................................26
Figure 11 LSB Extraction Mechanism..........................................................................................27
Figure 12 DWT Steganographed Image........................................................................................28
Figure 13 DWT Embedding Mechanism.......................................................................................29
Figure 14 DWT extraction mechanism.........................................................................................30
Figure 15 Flow diagram of Proposed Mechanism at sender side...................................................31
Figure 16 Flow diagram of Proposed Mechanism at Receiver side...............................................32
Figure 17 Input image...................................................................................................................33
Figure 18 Block divided and Arnold Transformed Image.............................................................33
Figure 19 Block Swapped Image..................................................................................................34
Figure 20 Cover, Secret, Stego and Extracted Image of Proposed Work......................................35
Figure 21 Outputs of Arnold-LSB and Arnold-DWT Techniques.................................................36
Figure 22 Plot of MSE values of Arnold-LSB vs Arnold-DWT....................................................37
Figure 23 Plot of PSNR values of Arnold-LSB vs Arnold-DWT..................................................39
Figure 24 Plot of Entropy values of cover and stego images for LSB and DWT Techniques.......40
Figure 25 Plot of Average timing of Arnold-LSB vs. Arnold-DWT.............................................41
Chapter 1
Introduction
1.1 Image Processing
Image processing is a method to convert an image into a digital form and perform
operations on it, in order to get an enhanced image or to extract some useful information
from it. It is a type of signal dispensation in which input is image, like video frame or
photograph and output may be image or characteristics associated with that image. Image
Processing can also be defined as a technique to enhance raw images received from
cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in
normal day-to-day life for various applications. Various techniques have been developed
in Image Processing during the last four to five decades. Most of the techniques are
developed for enhancing images obtained from unmanned spacecraft, space probes and
military reconnaissance flights. Image Processing systems are becoming popular due to
easy availability of powerful personnel computers, large-sized memory devices, graphics
software etc. [1] It is a rapidly growing area of computer science and its growth has been
fuelled by technological advances in digital imaging, computer processors and mass
storage devices. Fields which traditionally used analog imaging are now switching to
digital systems, for their flexibility and affordability. Important examples are medicine,
video production, photography, remote sensing, and security monitoring. These and other
sources produce huge volumes of digital image data every day, more than could ever be
examined manually. Digital image processing is concerned primarily with extracting
useful information from images. Ideally, this is done by computers, with little or no
human intervention [2]. The purpose of image processing has been divided into five
groups. They are:
1. Visualization - Observe the objects that are not visible.
2. Image sharpening and restoration - Creating a better image.
3. Image retrieval - Seek for the image of interest.
4. Measurement of pattern – Measures various objects in an image.
5. Image Recognition – Distinguish the objects in an image.
1.2 Applications of Image Processing
As optics, imaging sensors, and computational technology advanced, image processing
has become more commonly used in many different areas. Some areas of application of
digital image processing include image enhancement for better human perception, image
compression and transmission, as well as image representation for automatic machine
perception. Most notably, digital image processing has been widely deployed for defence
and security applications such as small target detection and tracking, missile guidance,
vehicle navigation, wide area surveillance, and automatic/aided target recognition. One
goal for an image processing approach in defence and security applications is to reduce
the workload of human analysts in order to cope with the ever increasing volume of
image data that is being collected. A second, more challenging goal for image processing
research is to develop algorithms and approaches that will significantly aid the
development of fully autonomous systems capable of decisions and actions based on all
sensor inputs. Broad areas of digital image processing applications include:
• Medical applications (Gamma ray imaging, PET scan, X Ray Imaging, Medical CT,
UV imaging)
• Restorations and enhancements
• Digital cinema
• Image transmission and coding
• Color processing
• Remote sensing
• Robot vision
• Hybrid techniques
• Facsimile
• Pattern recognition
• Registration techniques
• Multidimensional image processing
• Image processing architectures and workstations
• Video processing
• Programmable DSPs for video coding
• High-resolution display
• High-quality color representation
• Super-high-definition image processing
• Impact of standardization on image processing [1, 4,27].
Chapter 3: The third chapter elaborates on the problem statement and Project objectives.
Chapter 4: The fourth chapter elaborates on the Arnold Cat Map, LSB and DWT
steganography discussing its key characteristics and the various parameters.
Chapter 5: The final chapter gives the implementation details of the work done in this
report and the observations made thereafter. The chapter further contains comparative
plots of some parameters for both attempted techniques. The simulation results of the
designs are also given in this chapter.
Literature Survey
The research designed the application of steganography using Least Significant Bit (LSB)
in which the previous message is encrypted using the Advanced Encryption Standard
algorithm (AES) and it can restore the previously hidden data. The messages in this form
application and hidden text on media digital image so as not to arouse suspicion. The
result of research shown the steganography is expected to hide the secret message, so the
message is not easy to know other people who are not eligible.
Least Significant Bit (LSB) is one method that is widely used in steganography because it
is simple computation and hidden message relative safe. Hiding message strategy with
this method is replacing bits of data messages with the lowest bit in the media / cover.
The quality of the digital image is changing after inserted message. Changes in quality
depend on the size of the message inserted. While the size of digital image also changed
after the insertion process of the message [9, 14].
AES provides high security but takes much time in execution and LSB technique is easy
and fast but it have drawback if the message have a great size, it will affect the image and
it can be noticeable [11].
In this technique, the image to be encrypted is decomposed into 8X8 blocks; these blocks
are transformed from the spatial domain to frequency domain by the DCT. Then, only
selected DCT coefficients i.e. the DCT coefficients correlated to the higher frequencies of
the image block are encrypted. For encryption the DCT coefficients are XORed with
pseudorandom bit, Pseudorandom bit is generated by Non-Linear Shift back Register.
The bits generated by Non- Linear Shift back Register cannot be predicted so
cryptanalysis becomes difficult. To enhance the security further, the unencrypted DCT
coefficients are shuffled, since some information may also be stored in DCT coefficient
correlating to lower frequency. While encrypting selected DCT coefficients alone will
provide complete perceptual encryption, it would be possible for an attacker to gain
information about the image from the other coefficients, especially in images that have a
lot of edges. This technique is used for faster image encryption. Here partial image
encryption is used to decrease the time required for encryption and decryption. Instead of
encrypting the whole image only the selected portion of the image are encrypted. To add
additional security to the image in the cryptosystem, after encrypting the selected higher
coefficients, all the coefficients can be scrambled. The idea behind scrambling all the
coefficients is to withstand any type of attack [13]. This technique makes the encryption
faster and reduces the time complexity.
During Recent days, huge importance is given to Reversible Data Hiding (RDH)
techniques in images, since it assures the excellent feature of retrieving the original cover
image information in a lossless manner after embedded secret information is extracted,
while protecting the image contents confidentiality. RDH technique is a lossless data
hiding scheme for color cover images with very important and confidential information
content. This method, exploits least computational complexity by using histogram
shifting technique to hide secret bits in confused color cover image, where confusion in
cover image is created by using Quad tree decomposition. An enhanced histogram
shifting method is used for color images by embedding the secret information into three
different planes of RGB image in such a way that, it not only improves the quality of
image and also achieves high embedding capacity. This algorithm hides the pay load by
using histogram shifting technique into non overlapped block of pixels. A histogram
shifting based reversible data hiding technique for color images has been proposed, which
could result with high visual quality and as well as high embedding capability. This
method was found reliable to hide the data and retrieve the data by recovering the cover
image as well. The most useful feature of this algorithm is that, it could be applied for
even DICOM images [7]. This technique improves the quality of image and also achieves
high embedding capacity but it exploits the least computational complexity.
Next technique is an advanced technique for encrypting data using Advanced Encryption
System (AES) and hiding the data using Haar Discrete Wavelet Transform (HDWT).
One-fourth of the image carrying the details of the image in a region and other three
regions carrying a less details of the image then the cipher text is concealed at most two
Least Significant Bits (LSB) positions in the less detailed regions of the carrier image, if
the message doesn’t fit in the first LSB only it will use the second LSB. This algorithm
covers almost all type of symbols and alphabets.
Wavelet transform has the capability to offer some information on frequency-time
domain concurrently. In this transform, time domain is passed through high-pass and low-
pass filters to extract high and low frequencies respectively. This process is repeated for a
number of times and each time a section of the signal is drawn out. DWT analysis splits
signal into two classes (i.e. Approximation and Detail) by signal decomposition for
different frequency bands and scales. DWT employs two function sets: scaling and
wavelet which associate with low and high pass filters orderly.
Figure 3 Detailed 2D Haar Wavelet Transform
Decomposition follows the manner of dividing time separability. Meanly, only half of the
samples in a signal are sufficient to represent the whole signal, doubling the frequency
separability. Haar wavelet operates on data by calculating the sums and differences of
adjacent elements. This wavelet operates first on adjacent horizontal elements and then on
adjacent vertical elements. One important feature of the Haar wavelet transform is that the
transform is equal to its inverse. Each transform computes the data energy in relocated to
the top left hand corner. After each transform is performed the size of the square which
contains the most important information is reduced by a factor of 4 as seen in Figure 4.
HDWT aims to decrease the complexity in image steganology while providing less image
distortion and lesser detectability [11].
2.5 Data Encryption Standard (DES) Algorithm
Here, securing of the image by encryption is done by DES algorithm using the key image.
The encrypted image is hidden in another image by using LSB techniques, so that the
secret’s very existence is concealed. The decryption can be done by the same key image
using DES algorithm. The algorithm is designed to encipher and decipher blocks of data
consisting of 64 bits under control of a 64-bit key. Deciphering must be accomplished by
using the same key as for enciphering, but with the schedule of addressing the key bits
altered so that the deciphering process is the reverse of the enciphering process. Each byte
(pixel) of all the three matrices (R, G, B matrices of payload) are encrypted using DES
algorithm and an image comprised of encrypted pixels is formed. The key used to encrypt
each pixel is of 10-bit length and is obtained from the pixels of key image. The pixel
values of red, green and blue intensities of each pixel of key image are combined to get a
24-bit value. The first ten bits are selected as the key to encrypt the red intensity pixel of
payload image. The middle ten bits will be the key to encrypt the green intensity pixel of
payload and finally the last ten bits is the key to encrypt blue intensity pixel of payload
image. So the size of key image must be same as that of payload. If not, then the key
image will get resized. Each pixel (24-bit) of the key image is split into three keys (10- bit
each). LSB technique is used to embed information in a cover image [15].
Another method is data hiding in which secret image is hidden behind a carrier image but
due to data hiding cover image has experienced eternal problems. A new kind of mosaic
image is being created known as secret fragment visible mosaic image for hiding the
existence of secret image with the help of target image. Mosaic image generation contains
following steps:
1. Divide original secret image into number of small tiles.
2. For every tile, find another image with similar contents.
3. Replace all tiles with their similar images for image mosaic generation.
This method has two main stages, namely: Creation of mosaic image; Recovery of secret
image. In the first phase of mosaic image, creation of mosaic image is done in highly
equipped way in which created mosaic image contains color corrected fragments of target
image. This approach consists of four stages: Fit the tile images of secret image in the
corresponding blocks of user selected target image; Transform the color characteristics of
each tile image of secret image to become that of corresponding target blocks in target
image, so mosaic image looks similar like target image.; A new thing involved in this
work is rotating of each tiles of secret image with minimum RMSE with respect to the
blocks of target image for better fitting of tiles into created mosaic image.; The most
important step is embedding of relevant information into the created mosaic image for
further recovery of the original secret image in lossless manner. The Recovery of secret
image also consists of four steps: To recover original secret image from created mosaic
image, extract the embedded information from the created mosaic image.; Reverse
transform the color characteristics of each tile image of secret image with respect to the
corresponding target block.; Reverse rotate each tile image into a direction with respect to
its corresponding target block.; Recovering the secret image using extracted information.
This scheme is advantageous over conventional schemes to protect the privacy during
transmission. In order to control overflows and underflows, the color transformation
scheme is used [10]. It was found that the method gives high quality mosaic image and
accurate extraction of secret image but was very complex.
2.7 Modified Advanced Encryption Standard
There is a modification in AES as Modified AES (MAES) which presents a new shift row
transformation that enhances the security of AES. MAES is byte oriented. The 128 bit
plaintext is considered as sixteen 8 bit bytes. To be able to perform some mathematical
transformations on bytes MAES defined the concept of state. A state is 4*4 matrix in
which each entry is byte. The new shift row transformation used in MAES is performed
on the rows of the state. It cyclically shifts the bytes of each row depending upon the first
element of state. If the value in first row and first column of state matrix is even then first
row remains unchanged; each bytes in second, third and fourth are cyclically shifted left
over different numbers.
The calculated and analysed histograms of several encrypted images as well as original
images which have totally different content. The histogram of encrypted image is totally
different from that of original image. It was clear from the histograms of plain and cipher
image that there is no resemblance between original and encrypted image. Hence does not
provide any clue to employ statistical attack on proposed image encryption procedure [8].
MAES is very secure but takes large execution time and is very complex.
2.8 Arnold Transformation
Another approach provides two levels of security through a two-step process, Image to be
transmitted is scrambled in a random order generated by 2D Arnold Cat Map after that
encrypted message is hidden behind a cover image using basic LSB method, rather than
hiding the message bits directly in cover image. Image scrambling techniques scramble
the pixels of an image in such a manner that the image becomes chaotic and
indistinguishable. Hence, the message remains highly secured against unauthorized
access. Scrambled message is passed to the second layer, where user enters a stego- key
and a cover image, and then the scrambled message is hidden in the cover image through
stego-key. The two key are required to retrieving back the data at receiver’s side that have
been hidden inside the cover image.
Experimental study points out that this system is better than basic LSB method in terms
of higher visual quality [12].
2.9 Conclusion of Literature Survey
In the above mentioned techniques, it is found that methods used in them are not suitable
for image encryption for two main reasons. The first reason is that the image size is
almost always much greater than that of text, which needs much time to directly encrypt
the image data using the software implementations of traditional cryptosystems. The
second reason is laying on its sensitivity. The decrypted text must be exactly equal to the
original text. However, this requirement is not necessary for image data. Because of
human perception property and the high redundancy of image data, a decrypted image
containing small distortion is usually acceptable. DCT is faster but selected DCT
coefficients are providing complete perceptual encryption that will allow attacker to gain
information about the image from the other coefficients present in the edges of an image.
Use of visible mosaic image provided high quality mosaic image and gives accurate
extracted image but is very complex. In different stenographic techniques mentioned
above, LSB is the most simple and fast technique but it have a drawback that if the
message have a great size, it will affect the image and it can be noticeable. RDH
technique improves the quality of image and also achieves high embedding capacity but
Quad tree decomposition and histogram shifting method makes it slow. HDWT technique
is less complex, fast and gives less image distortion and lesser detectability.
The Arnold Transformation has suggested a new and efficient way to deal with
the intractable problem of fast and highly secure image encryption. This chaotic system is
rich in significance and in implication because of sensitivity to change initial conditions,
control parameters, random-like behaviour, repeated processing and very high diffusion
and confusion properties that are desirable for cryptography. Among all the above
mentioned techniques it is found that Arnold Transformation and HDWT techniques were
found to be fast and provide good security. In addition to this, HDWT provided better
quality than some other steganographic techniques. Combining both techniques would
give better security and can help in improving the quality of an image [23].
Chapter 3
Project Objective
3.1 Problem Statement
Techniques discussed in the previous chapter have certain limitations in terms of quality,
complexity etc. hence can’t be used for all image processing applications. Among
different techniques discussed above, it is observed that while making an image secure
there was a significant difference in the quality of the input and output image. Due to
many cryptographic and steganographic processes, the quality of the image reduces which
results in loss of important information from the image. Safeguarding images in-transit
and maintaining quality of image is the main focus of our work.
Arnold’s cat map (ACM) or Arnold transform (AT), proposed by Vladimir Arnold in
1960, is a chaotic map which when applied to a digital image randomizes the original
organization of its pixel locations and the image becomes chaotic. However, it has a
period k and if iterated k number of times, the original image reappears. The generalized
form of Arnold's cat map can be given by
Г x = 2 1 x mod 1= 1 1 1 0 x mod 1
([ ]) [ ][ ]
y 1 1 y 0 1 1 1 y [ ][ ][ ]
That is, with a unit equal to the width of the square image, the image is sheared one unit
up, then two units to the right, and all that lies outside that unit square is shifted back by
the unit until it is within the square.
Figure 8 Arnold Transformation on a Grey Scale Cameraman Image
LSB technique is a technique in which the least significant bit of some or all of the bytes
inside an image is changed to a bit of the secret image. Digital images are mainly of two
types i.e. 24 bit images and 8 bit images. In 24 bit images, three bits of information in
each pixel, one in each LSB position of the three eight bit values is changed to a bit of
secret image. Increasing or decreasing the value by changing the LSB does not change the
appearance of the image much so the resultant stego image looks almost same as the
cover image. In 8 bit images, one bit of information can be hidden. The hidden image is
extracted from the stego-image by applying the reverse process [16, 21].
If the LSB of the pixel value of cover image C(i,j) is equal to the message bit m of secret
massage to be embedded, C(i,j) remain unchanged; if not, set the LSB of C(i, j) to m. The
message embedding procedure is given below:
Where LSB(C(i, j)) stands for the LSB of cover image C(i,j) and m is the next message
bit to be embedded. S(i,j) is the stego image
In this case, only four bits needed to be changed to insert the character successfully. The
resulting changes that are made to the least significant bits are too small to be recognised
by the human eye, so the message is effectively hidden. The advantage of LSB
embedding is its simplicity and many techniques use these methods [22]. LSB embedding
also allows high perceptual transparency. The following figure 4.2 shows the output of
LSB technique. The secret image is hidden in cover image by replacing LSB bit of cover
image. The output of the LSB technique is the stego image which is same as cover image
as shown in figure. Then hidden bits are extracted from stego image to give back the
secret image [19].
Figure 9 LSB Steganographed Image
The cover and secret images are first read and converted into the unit8 type. The numbers
in secret image matrix are conveyed to 8-bit binary. Then the matrix is reshaped to a new
matrix a. The matrix of the cover image is also reshaped to matrix b. Embedding process
first extracts the pixels of the cover image and the secret image. It also extracts the
characters from the Stego key. In next step, it chooses first pixel and picks characters of
the Stego key and places it in the first component of pixel. Embedding process uses some
terminating symbol to indicate end of the key. Then, it insert bits of secret image in first
component of pixels of cover image by replacing it and repeats the above steps till all the
bits of secret image has been embedded. Again it places some terminating symbol to
indicate end of bits which has to be hidden. Obtained image is the stego image. The stego
image, is very similar to the original cover image, achieved by reshaping matrix b [20].
Figure 10 below shows the LSB insertion mechanism which hides the secret image in a
cover image using stego key. The output of the LSB embedding is stego image.
Figure 10 LSB Insertion Mechanism
In extraction process, first the pixels of the stego image are extracted. Now, the process
starts from the first pixel and extracts the stego key characters from first component of the
pixels of stego image. This step follows up to terminating symbol. If the extracted key
matches with the key entered by the receiver then go to next pixel otherwise terminate the
program. Next pixel is followed only if the key is correct, and extract secret bit from first
component of next pixels. This step is followed up till the terminating symbol, otherwise
continue extracting the bits of secret image [21, 22]. While extracting the bits, the LSB of
the stego image is collected and they are reconstructed into the decimal numbers. The
decimal numbers are reshaped to the secret image [20]. Figure 11 below shows the
mechanism where stego image and stego key are used as input to the extraction process;
the output is the extracted secret image.
Figure 11 LSB Extraction Mechanism
Discrete Wavelet Transform is used for digital images. Many DWTs are available.
Depending on the application most appropriate one should be used. If we apply DWT on
an image, it divides the image in frequency components. When DWT is applied to an
image it is decomposed into four sub bands: LL, HL, LH and HH. The LL part contains
the most significant features. So if the information is hidden in LL part the stego image
can withstand compression or other manipulations [5]. Sometimes distortion may be
produced in the stego image and then other sub bands can be used. The low frequency
components are approximate coefficients holding almost the original image and high
frequency components are detailed coefficients holding additional information about the
image. These detailed coefficients can be used to embed secret image. In embedding
process, first we convert cover image in wavelet domain. After the conversion we
manipulate high frequency component to keep secret image data. These secret image data
further retrieved in extraction procedure to serve the purpose of steganography. Figure 11
shows the outputs of DWT technique where cover image is divided into four sub bands,
the bits of secret image are embedded in the high frequency sub band of cover image.
Output of the process is a stego image which is same as cover image as shown in the
figure 12. The bits from stego image are extracted to give original secret image back
using [6].
Figure 12 DWT Steganographed Image
In this process, insertion of secret message onto cover object is carried out. An m × n
carrier image and a secret image act as input. The cover image (Ic) is first read and its size
is calculated. In next step Secret image (Im) is read to work as a message vector. Then
cover image (Ic) is decomposed by using discrete Haar wavelet transform. Components
with detailed coefficients like horizontal and vertical coefficients of wavelet
decomposition are modified with secret bits which have to be hidden. Then, Inverse DWT
is applied which gives output as m×n stego image. Figure 13 below shows the flow
diagram of the DWT embedding process where Cover image is divided into four sub
bands using DWT and high frequency coefficients are selected. These coefficients are
then modified based on the secret image bits and IDWT technique is applied to give stego
image as output.
Figure 13 DWT Embedding Mechanism
Chapter 5
Above figure 15 shows the flow diagram of the system at the sender side to make an
image secure with the help of Arnold’s Cat Map and Steganographic technique. In the
Encryption process, to make an image secure Input image is first divided into different
number of blocks; these blocks are then swapped just to confuse the intruders. Then
Arnold Transformation is applied to these different blocks. Output of this Arnold
Transformation is the scrambled image whose pixels are randomised according to the
number of iterations. This scrambled image is then hidden in some cover media as shown
in figure to hide the existence of the secret image using Steganographic techniques. Here,
we are using LSB and HDWT techniques to embed Arnold transformed scrambled image,
then the output of these Steganographic processes would be stego image which will look
like cover image. This Stego image is the output of the encryption process.
Figure 16 Flow diagram of Proposed Mechanism at Receiver side
Figure 16 shows the decryption process where stego image works as input image. From
the stego image, Secret Scrambled image is extracted using de-Steganographic technique
i.e. Inverse LSB or IDWT Technique. Then the blocks of this extracted image are
unswapped to their original positions. This image is then Inverse transformed using
Inverse Arnold Transformation. The output would be the original secret image.
5.2 Results
To compare the results of Arnold Transformation combined with LSB technique and
Arnold Transformation combined with DWT technique, various outputs at each step are
shown below. Figure 17 shows an input image of size 256 X256 in which the LSB and
DWT techniques along with Arnold Transformation are implemented.
Figure 17 Input image
Figure 18 below represents the block- divided input image after Arnold Transformation
has been applied to it.
Figure 20 shows the output of the Arnold transformation combined with Steganographic
process which includes cover image i.e. peppers.png of size 256X256, the secret image
which is to be hidden in the cover image is the Arnold transformed image is shown in
second part of the figure, third part shows the output of the steganographic process i.e. the
stego image. This stego image is then sent through public communication channel to hide
the existence of secret image. Fourth part of the figure shown below is the extracted
secret image which is the same Arnold transformed image which was hidden in the cover
image.
Figure 20 Cover, Secret, Stego and Extracted Image of Proposed Work
Figure 21 shown below is the output of both the techniques. Figure at the left side is the
output of the Arnold transformation combined with LSB technique and the figure at the
right side is the output of the Arnold transformation combined with DWT technique. We
can see that the output of the Arnold combined with DWT gives much better results than
the Arnold combined with LSB. These techniques will be compared on the basis of
various parameters such as PSNR, MSE, Entropy values and the average timings of both
the techniques will also be compared for encryption and decryption processes.
Figure 21 Outputs of Arnold-LSB and Arnold-DWT Techniques
Table 2 gives the measured values of PSNR for different types of grayscale input images
of size 256×256. It is observed that for all the input images there is considerable amount
of changes between the PSNR values of both the techniques. Since MSE and PSNR are
inversely proportional to each other, PSNR of the Arnold transform combined with LSB
technique is found to be smaller than the PSNR of the Arnold transform combined with
DWT technique. Figure 23 shown below is the plot of the PSNR values of Arnold-LSB
vs. Arnold-DWT. PSNR is greater than 75db, this indicates good performance of the
proposed system (Arnold-DWT) which was only 70db in the previous technique (Arnold-
LSB). This shows that Arnold combined with DWT gives better results than Arnold
combined with LSB.
Table 2: PSNR values of Arnold-LSB and Arnold-DWT
Image 256X256 Arnold-LSB Arnold-DWT
Fruit.bmp 70.2819 75.7726
Baboon.bmp 70.0225 76.1066
Elephant.gif 70.0632 75.9172
Bird.gif 70.3477 76.1406
Bank.jpg 70.3834 75.6886
Einstein.jpg 70.2348 75.9725
Lena.png 70.0615 75.8588
Obama.png 70.6675 75.8236
Rangoli.tif 71.9857 76.5451
Cameraman.tif 70.5057 76.8450
Figure 23 Plot of PSNR values of Arnold-LSB vs Arnold-DWT
The entropy of pixels v={ m0 , m1 , … .m255 } with equal probability p ( m i ) equals 8, which is
the perfect value. The entropy of stego image must be close to the perfect value as much
as possible [28].
The entropy for stego images is also tested and it was close to 8 in case of DWT
steganography. Table 3 lists the entropies of both cover and stego image using various
input images for both LSB and DWT techniques, where
The entropy of cover image is found as 7.6114 since we have taken same cover image for
both techniques using different input images which are to be hidden i.e. Arnold
transformed images. Figure 24 shows the plot of entropy values of cover and stego
images for LSB and DWT techniques, which shows that the entropy values of DWT
technique is far better than that of LSB values.
Table 3: Entropy values of cover and stego images for LSB and DWT Techniques
Image 256X256 LSB DWT
Fruit.bmp E1=7.6114 E1=7.6114
E2=7.5239 E2=7.6993
Baboon.bmp E1=7.6114 E1=7.6114
E2=6.5646 E2=7.6475
Elephant.gif E1=7.6114 E1=7.6114
E2=7.2486 E2=7.6785
Bird.gif E1=7.6114 E1=7.6114
E2=6.6908 E2=7.6501
Bank.jpg E1=7.6114 E1=7.6114
E2=7.4028 E2=7.6842
Einstein.jpg E1=7.6114 E1=7.6114
E2=6.8538 E2=7.6583
Lena.png E1=7.6114 E1=7.6114
E2=7.2179 E2=7.6842
Obama.png E1=7.6114 E1=7.6114
E2=7.3058 E2=7.7053
Rangoli.tif E1=7.6114 E1=7.6114
E2=6.5867 E2=7.7063
Cameraman.tif E1=7.6114 E1=7.6114
E2=7.0404 E2=7.6821
Figure 24 Plot of Entropy values of cover and stego images for LSB and DWT Techniques
5.2.4 Comparison of timings of Arnold-LSB vs. Arnold-DWT
Table 4 shows the average timings for encryption and decryption processes of both the
techniques. It was found that Arnold-LSB technique takes little less time than that of
Arnold-DWT technique which is shown in Figure 25 below.
Encryption Decryption
5.3 Discussion
From the above results it is concluded that the Arnold-DWT transformed image provides
better quality output image as compared to the Arnold-LSB transformed image. There is a
significant improvement between the measured values of PSNR and MSE values of
Arnold-DWT over Arnold-LSB. The changes in the entropies of stego image using LSB
and DWT also show that DWT provides much better results in comparison to LSB
technique. However, the time taken by Arnold-DWT transformation is found to be
slightly higher than Arnold-LSB transformation.
Chapter 6
Conclusion
In this report a comparison on two steganographic processes i.e. LSB and DWT
techniques is being done which are combined with Arnold transformation. All image
quality parameters described in this report have been calculated for different types of
images. Output results have been evaluated for comparison of both the techniques. These
result shows that Arnold transformed DWT technique provides better quality over Arnold
transformed LSB technique as there is a significant increase of 7.96% and 9.03% in the
PSNR and Entropy values respectively and 72.08% of decrement in the MSE value of
Arnold Transformed DWT technique with respect to Arnold Transformed LSB technique.
Input image was also divided into different blocks which slightly enhances the security of
the Arnold transformed image.
The performance of a steganographic technique is rated by three parameters; (i)
hiding capacity, (ii) imperceptibility and (iii) robustness. The hiding capacity means the
maximum amount of information that can be hidden in an image. It can also be
represented as the number of bits per pixel. It is analysed that the size of the cover image
must be greater than or equal to the size of the image which is to be embedded. The
perceptual imperceptibility of the embedded image is indicated by comparing the cover
image and the stego image so that their visual differences, if any, can be determined. The
Visual score test of imperceptibility is performed to compare the stego image obtained in
DWT and LSB technique and 98% result is found in the favour of DWT technique.
Robustness refers to how well the steganographic system resists the extraction of data.
Robustness measures the ability of embedded data to withstand against various changes in
the image. Robust image steganography algorithm is based on maximum entropy.
Measured values of Entropy obtained in this work indicate that Arnold-DWT is more
robust than Arnold-LSB technique. All these parameters show that Arnold-DWT is
provide better results than Arnold-LSB technique.
References
[1] Rao, Raghuveer M., and Manoj K. Arora. "Overview of image processing."
In Advanced image processing techniques for remotely sensed hyperspectral data, pp. 51-
85. Springer Berlin Heidelberg, 2004.
[2] Soni, Megha, Asst Prof Anand Khare, and Asst Prof Saurabh Jain. "A SURVAY OF
DIGITAL IMAGE PROCESSING AND ITS PROBLEM." International Journal of
Scientific and Research Publications (2014): 168.
[3] Huang, T. S., and K. Aizawa. "Image processing: some challenging
problems." Proceedings of the National Academy of Sciences 90, no. 21 (1993): 9766-
9769.
[4] Billingsley, Fred C. "Applications of digital image processing." Applied Optics9, no. 2
(1970): 289-299.
[5] Mandal, Pratap Chandra. "A Study of Steganography Technique using Discrete
Wavelet Transform." Journal of Global Research in Computer Science 5, no. 5 (2014).
[6] Banik, Barnali Gupta, and Samir Kumar Bandyopadhyay. "Secret sharing using 3
level DWT method of image steganography based on Lorenz chaotic encryption and
visual cryptography." In Computational Intelligence and Communication Networks
(CICN), 2015 International Conference on, pp. 1147-1152. IEEE, 2015.
[7] Devi, Anitha, and K. B. ShivaKumar. "Protection of confidential color image
information based on Reversible Data Hiding technique (PCCIRT)." In 2015
International Conference on Computing and Network Communications (CoCoNet), pp.
742-747. IEEE, 2015.
[8] Saini, Jaspal Kaur, and Harsh K. Verma. "A hybrid approach for image security by
combining encryption and steganography." In Image Information Processing (ICIIP),
2013 IEEE Second International Conference on, pp. 607-611. IEEE, 2013.
[9] Ahmad, Syukri Sayyid. "Steganography for inserting message on digital image using
least significant bit and AES cryptographic algorithm." In Cyber and IT Service
Management, International Conference on, pp. 16. IEEE, 2016.
[10] Phutane, Mr Indrajeet, and Sanjay Nalbalwar. "A New Method For Secret Image
Transmission via Secret Fragment Visible Mosaic Image."
[11] Houssein, Essam H., Mona AS Ali, and Aboul Ella Hassanien. "An image
steganography algorithm using Haar Discrete Wavelet Transform with Advanced
Encryption System." In Computer Science and Information Systems (FedCSIS), 2016
Federated Conference on, pp. 641-644. IEEE, 2016.
[12] Bhardwaj, Rupali, and Divya Khanna. "Enhanced the security of image
steganography through image encryption." In 2015 Annual IEEE India Conference
(INDICON), pp. 1-4. IEEE, 2015.
[13] Divya, V. V., S. K. Sudha, and V. R. Resmy. "Simple and secure image encryption."
International Journal of Computer Science 9, no. 6 (2012): 286.
[14] Radhadevi, P., and P. Kalpana. "Secure image encryption using AES." International
Journal of Research in Engineering and Technology Volume: 1 Issue 2 (2012).
[15] Nivedhitha, R., and T. Meyyappan. "Image security using steganography and
cryptographic techniques." International Journal of Engineering Trends and Technology
1, no. 3 (2012): 366-371.
[16] Anderson, Ross J., and Fabien AP Petitcolas. "On the limits of
steganography." IEEE Journal on selected areas in communications 16, no. 4 (1998):
474-481.
[17] Wategaonkar, S. R., Vrushali Gaikwad, Suvarna Kalghuge, Ashvini Gandhare, and
Prajakta Bawakar. "AN IMPROVED LSB BASED STEGANOGRAPHY TECHNIQUE
FOR RGB COLOUR IMAGES."
[18] Cheddad, Abbas, Joan Condell, Kevin Curran, and Paul Mc Kevitt. "Digital image
steganography: Survey and analysis of current methods." Signal processing 90, no. 3
(2010): 727-752.
[19] Krenn, Robert. "Steganography and steganalysis." (2004).
[20] Juneja, Mamta. "Data Hiding Algorithm for Bitmap Images Using
Steganography." communications 1: 4.
[21] Devi, Kshetrimayum Jenita. "A Secure Image Steganography Using LSB Technique
and Random Pseudo Random Encoding Technique." PhD diss., 2013.
[22] Kavitha, Kavita Kadam, Ashwini Koshti, and Priya Dunghav. "Steganography using
least significant bit algorithm." International Journal of Engineering Research and
Applications 2, no. 3 (2012): 338-341.
[23] Thapliyal, Pragati, and Madhu Sharma. "A image encryption scheme using chaotic
maps." International Journal 4, no. 1 (2015).
[24] Svanström, Fredrik. "Properties of a generalized Arnold’s discrete cat map." (2014).
[25] Li, Min, Ting Liang, and Yu-jie He. "Arnold transform based image scrambling
method." In 3rd International Conference on Multimedia Technology. 2013.
[26] Hussainbabu, G. "Secure Data Transmission Using Cryptography and
Steganography."
[27] Saxena, Ekta, and Mrs Neha Goswami. "Automatic Object Detection in Image
Processing: A Survey."
[28] Abdul-Majeed, Ansam Osama. "Chaotic Scheme for Image Encryption Based on
Arnold Cat's Map." International Journal of Computer Science and Information
Security 12, no. 3 (2014): 26.