An Efficient Data Embedding Technique Using Image As A Digital Media

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 12

An Efficient Data Embedding Technique Using Image As A Digital Media

ABSTRACT

In the present world of communication, one of the necessary requirements


to prevent data theft is securing the information. Security has become a critical feature for
thriving networks and in military alike. Cryptography and Steganography are well known
and widely used techniques that manipulate information (message) in order to cipher or
hide their existence. These techniques have many applications in computer science and
other related fields: they are used to protect military messages, E-mails, credit card
information, corporate data, personal files, etc. Data hiding is a technique that conceals
data into a carrier signal for conveying secret messages confidentially. Steganography
hides the message in digital media. The purpose of steganography is to conceal the fact
that some communication is taking place. Digital images are widely transmitted over the
internet; therefore, they often serve as a carrier for covert communication. Images used
for carrying data are termed as cover images and images with data embedded are termed
as stego images. After embedding, pixels of cover images will be modified and distortion
occurs. The distortion caused by data embedding is called the embedding distortion The
basic idea of pixel pair matching is to use the values of pixel pair as a reference
coordinate, and search a coordinate in the neighborhood set of this pixel pair according to
a given message digit, the pixel pair is then replaced by the searched coordinate to
conceal the digit. Exploiting modification direction (EMD) and diamond encoding (DE)
are two data-hiding methods proposed recently based on PPM. In the EMD method 5-ary
method is used as notational system so its payload is 1.161 bpp and DE extends the
payload of EMD by embedding digits in a larger notational system. The APPM method
offers lower distortion than DE by providing more compact neighborhood sets and
allowing embedded digits in any notational system. Image distortion occurs when pixel
values are modified because of data embedding. We use MSE to measure the image
quality. MSE represents the mean square error between the cover image and stego image.
A smaller MSE indicates that the stego image has better image quality.

M.TECH, LSP, IV SEM 1 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

INTRODUCTION
In the present world of communication, one of the necessary requirements
to prevent data theft is securing the information [1]. Security has become a critical feature
for thriving networks and in military alike. Cryptography and Steganography are well
known and widely used techniques that manipulate information (message) in order to
cipher or hide their existence. These techniques have many applications in computer
science and other related fields: they are used to protect military messages, E-mails,
credit card information, corporate data, personal files, etc.
In previous section it is reported that steganography is the platform for the
data hiding in a digital file (Image).And steganalysis is the method for detecting the
hidden information. The methodology stated is APPM(Adaptive pixel pair matching).The
basic idea of PPM is to use the values of pixel pair as a reference coordinate. And search
a coordinate in the neighborhood set of this pixel pair according to a given message digit.
The pixel pair is then replaced by the searched coordinate to conceal the message digit.
Applications of steganography:
(i) Copyright Protection:
Digital steganography is used to embed the copyright and authentication codes within
media content. The large-scale distribution of multimedia data has created the need to
protect digital information against illegal duplication and manipulation. For copyright-
protection applications, the stego image must be recoverable even when the stego image
undergoes a reasonable level of distortion.
In addition to embedding copyright information, the recipient information can be
embedded in the original image to trace the image distribution.
(ii) Authentication
Digital steganography are useful in the field of electronic commerce and distribution of
multimedia content to end users for the proof of authenticity of documents.
(iii) Hidden Annotations
Digital steganography can create hidden labels and annotations in medical applications.
In medical applications, steganography can be used to identifying patient records. These

M.TECH, LSP, IV SEM 2 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

records can be embedded directly into the image data associated with individual patients,
speeding access to records and preventing the error of mismatching records and patients.
(iv) Secure Communications
Digital steganography find applications in the defense sector where it is a must to
transmit the data secretly.

M.TECH, LSP, IV SEM 3 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

ARCHITECTURAL DESIGN FOR PROPOSED SYSTEM

1. Embedding Procedure

Cover image I

Secret data Select a pixel pair


(x, y) from image I

Compute the f(x, y)


Parameter k according to the
parameter k

Embed the secret


Secret digit in the pixels
using APPM

No
Are all the
secrets
symbols
embedded?

Yes

Stego-image

Fig 1: Design Flow of message bit embedding

M.TECH, LSP, IV SEM 4 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

2. Extracting Procedure

Stego image

Construct the
Parameter k embedding
sequence using the
key.

Select a pixel pair


from image

Extract the secret


digit in the pixels
using APPM

No
Are all the
secrets bits
extracted?

Yes

Secret bit stream

Fig 1: Design Flow of message bit stream extraction

M.TECH, LSP, IV SEM 5 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

ANALYSIS OF THE PROJECT

1) Extraction Function and Neighborhood Set

In this module we perform the action of extraction function and


neighborhood set. Where the system does a new data embedding method to reduce the
embedding impact by providing a simple extraction function and a more compact
neighborhood set. The proposed method embeds more messages per modification and
thus increases the embedding efficiency. The image quality obtained by the proposed
method not only performs better than those obtained by OPAP and DE. But also brings
higher payload with less detectability. Moreover, the best notational system for data
concealing can be determined and employed in this new method according to the given
payload is that a lower image distortion can be achieved.

2) Embedding Procedure
Input: Cover image of size, secret bit strewn, and key.

Output: Stego image

1. Find the minimum satisfying, and convert into a list of digits with a •ary notational
system.

2. Solve the discrete optimization problem to find and.

3. In the region defined by. record the coordinate such that..

4. Construct a no repeat random embedding sequence using a key.

5. To embed a message digit. two pixels in the cover image are selected according to the
embedding sequence. and calculate the modulus distance between and then replace
with.

6. Repeat Step 5 until all the message digits are embedded.

3) Extraction Procedure
To extract the embedded message digits. pixel pairs are scanned in the
same order as in the embedding procedure. The embedded message digits are the values
of extraction function of the scanned pixel pairs

Input: Stego image and key.

Output: Secret bit stream.

M.TECH, LSP, IV SEM 6 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

1. Construct the embedding sequence using the key.

2. Select two pixels according to the embedding sequence.

3. Calculate, the result is the embedded digit.

4. Repeat Steps 2 and 3 until all the message digits are extracted.

5. Finally, the message hits can be obtained by converting the extracted message digits
into a binary hit strewn.

4) Statistical Analysis of the Histogram Differences

In this module, we perform the goal of system analysis by using histogram


technique. The goal of steganography is to evade statistical detection. It is apparent that
MSE is not a good measure of security against the detection of steganalysis.

M.TECH, LSP, IV SEM 7 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

ALGORITHMS / TECHNIQUES USED

HISTOGRAM BASED DATA HIDING

M.TECH, LSP, IV SEM 8 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

Fig 3: Historam based Data Hiding

EXTRACTION OF DATA FROM HISTOGRAM BASED DATA HIDING

M.TECH, LSP, IV SEM 9 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

Fig 4: Extraction Of Data from Histogram based Data Hiding

DIFFERENCE EXPANSION BASED DATA HIDING

Fig 5: Difference Expansion based Data Hiding

PERFORMANCE REQUIREMENTS

Portability
The GUIs of this application is user-friendly so it is very easy for the user to understand
and respond to the same.
Reliability
This algorithm has high probability to deliver us the correct simulation and the
functionalities available in the application.
Scalability
The APPM algorithm can be extended to integrate the modifications done in the present
application to improve the quality of the image. This is meant for the future works that is
to be done on the application.

M.TECH, LSP, IV SEM 10 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

EXPECTED OUTPUTS

MSE comparison of the proposed method with LSB and OPAP

Payload LSB OPAP APPM MSE


(bpp) improvement
over OPAP

1 0.500 0.500 .375 0.125

2 2.500 1.500 1.344 0.156

3 10.500 5.500 5.203 0.297

4 42.500 21.500 20.518 0.982

REFERENCES

[1] Ingemar J. Cox, J.Fridrich, “Digital Watermarking and Steganography” second


edition, Morgan Kaufmann Publishers, Press, 2008.
[2] N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,”
IEEE Security Privacy, vol. 3, no. 3, pp. 32–44, May/Jun. 2003.
[3] A. Cheddad, J. Condell, K. Curran, and P. McK evitt, “Digital image steganography:
Survey and analysis of current methods,” Signal Process., vol. 90, pp. 727–752, 2010.
[4]Saurabh Singh,Gaurav Agarwal“Use of image to secure text message with the help of 
LSB replacement,”
[5] S. Lyu and H. Farid, “Steganalysis using higher-order image statistics,”IEEE Trans.
Inf. Forensics Security, vol.1, no. 1, pp. 111–119, Mar.2011.

M.TECH, LSP, IV SEM 11 S.J.C.I.T, 2012-13


An Efficient Data Embedding Technique Using Image As A Digital Media

[6] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,”
Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004.
[7] J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5,
pp. 285–287, May 2006.
[8] X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting
modification direction,” IEEE Commun. Lett., vol. 10, no. 11, pp. 781–783, Nov. 2006.
[9] W. Hong, T. S. Chen, and C. W. Shiu, “A minimal Euclidean distance searching
technique for Sudoku steganography [10] R.M.Chao,H.C.Wu,C.C.Lee, and Y.P.Chu, “A
novel image data hiding scheme with diamond encoding,” EURASIP J. Inf. Security,
vol.2009, 2009, DOI: 10.1155/2009/658047, Article ID 658047.
[11] J. Wang, Y. Sun, H. Xu, K. Chen, H. J.Kim, and S.H.Joo, “An improved
section-wise exploiting modification direction method,” Signal Process

Signature of the Student Signature of the Guide Signature of the HOD

M.TECH, LSP, IV SEM 12 S.J.C.I.T, 2012-13

You might also like