An Efficient Data Embedding Technique Using Image As A Digital Media
An Efficient Data Embedding Technique Using Image As A Digital Media
An Efficient Data Embedding Technique Using Image As A Digital Media
ABSTRACT
INTRODUCTION
In the present world of communication, one of the necessary requirements
to prevent data theft is securing the information [1]. Security has become a critical feature
for thriving networks and in military alike. Cryptography and Steganography are well
known and widely used techniques that manipulate information (message) in order to
cipher or hide their existence. These techniques have many applications in computer
science and other related fields: they are used to protect military messages, E-mails,
credit card information, corporate data, personal files, etc.
In previous section it is reported that steganography is the platform for the
data hiding in a digital file (Image).And steganalysis is the method for detecting the
hidden information. The methodology stated is APPM(Adaptive pixel pair matching).The
basic idea of PPM is to use the values of pixel pair as a reference coordinate. And search
a coordinate in the neighborhood set of this pixel pair according to a given message digit.
The pixel pair is then replaced by the searched coordinate to conceal the message digit.
Applications of steganography:
(i) Copyright Protection:
Digital steganography is used to embed the copyright and authentication codes within
media content. The large-scale distribution of multimedia data has created the need to
protect digital information against illegal duplication and manipulation. For copyright-
protection applications, the stego image must be recoverable even when the stego image
undergoes a reasonable level of distortion.
In addition to embedding copyright information, the recipient information can be
embedded in the original image to trace the image distribution.
(ii) Authentication
Digital steganography are useful in the field of electronic commerce and distribution of
multimedia content to end users for the proof of authenticity of documents.
(iii) Hidden Annotations
Digital steganography can create hidden labels and annotations in medical applications.
In medical applications, steganography can be used to identifying patient records. These
records can be embedded directly into the image data associated with individual patients,
speeding access to records and preventing the error of mismatching records and patients.
(iv) Secure Communications
Digital steganography find applications in the defense sector where it is a must to
transmit the data secretly.
1. Embedding Procedure
Cover image I
No
Are all the
secrets
symbols
embedded?
Yes
Stego-image
2. Extracting Procedure
Stego image
Construct the
Parameter k embedding
sequence using the
key.
No
Are all the
secrets bits
extracted?
Yes
2) Embedding Procedure
Input: Cover image of size, secret bit strewn, and key.
1. Find the minimum satisfying, and convert into a list of digits with a •ary notational
system.
5. To embed a message digit. two pixels in the cover image are selected according to the
embedding sequence. and calculate the modulus distance between and then replace
with.
3) Extraction Procedure
To extract the embedded message digits. pixel pairs are scanned in the
same order as in the embedding procedure. The embedded message digits are the values
of extraction function of the scanned pixel pairs
4. Repeat Steps 2 and 3 until all the message digits are extracted.
5. Finally, the message hits can be obtained by converting the extracted message digits
into a binary hit strewn.
PERFORMANCE REQUIREMENTS
Portability
The GUIs of this application is user-friendly so it is very easy for the user to understand
and respond to the same.
Reliability
This algorithm has high probability to deliver us the correct simulation and the
functionalities available in the application.
Scalability
The APPM algorithm can be extended to integrate the modifications done in the present
application to improve the quality of the image. This is meant for the future works that is
to be done on the application.
EXPECTED OUTPUTS
REFERENCES
[6] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,”
Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004.
[7] J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5,
pp. 285–287, May 2006.
[8] X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting
modification direction,” IEEE Commun. Lett., vol. 10, no. 11, pp. 781–783, Nov. 2006.
[9] W. Hong, T. S. Chen, and C. W. Shiu, “A minimal Euclidean distance searching
technique for Sudoku steganography [10] R.M.Chao,H.C.Wu,C.C.Lee, and Y.P.Chu, “A
novel image data hiding scheme with diamond encoding,” EURASIP J. Inf. Security,
vol.2009, 2009, DOI: 10.1155/2009/658047, Article ID 658047.
[11] J. Wang, Y. Sun, H. Xu, K. Chen, H. J.Kim, and S.H.Joo, “An improved
section-wise exploiting modification direction method,” Signal Process