A Pragmatic Approach in Lossless Data Hiding for JPEG Images T. S.Sandeep

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 1- Jan 2014
A Pragmatic Approach in Lossless Data Hiding for JPEG
Images
T. S.Sandeep
1#
#1
, J. Shankar babu *2, Dr.N. Sudhakar Reddy@3
Assistant Professor, Dept of CSE,SVEW, TIRUPATI, AP, India
Associate Professor, Dept of CSE,SVEW,TIRUPATI, AP, India
3@
PRINCIPAL, SVCE, TIRUPATI, AP, India
2*
Abstract— In this paper Reversible Data hiding restores
the carrier once the removing hidden secret information.
Many reversible data hiding techniques were proposed
within the past few years, but on analysis, almost all does
not have in providing the security and authentication. This
paper proposes a novel reversible data hiding technique
which effort is separable, the receiver can extract the
initial image or additional embedded information or both
based on the keys hold from the receiver. Alternatively the
receiver can verify the information hided through the data
hider, so that the work proposes both security and
authentication. Digital steganography and watermarking
are both types of information hiding. Digital
watermarking usually mentioned as hiding for comforting
the data. Information hiding in image process could occur
the long term frame distortions and then the initial cover
medium is probably not prepared to be turned around
precisely, once the hidden knowledge are extracted out.
This work proposes a novel scheme for separable
reversible data hiding in encrypted images. Within the
first phase, a content owner encrypts the initial
uncompressed image having an encryption key. Then, a
data-hider may compress minimal significant bits of the
encrypted image by using a data-hiding step to produce a
sparse space to allow for some additional data. Through
an encrypted image containing additional data, if the
receiver gets the data-hiding key, he is able to extract the
additional data though he doesn't be aware of image
content. When the receiver contains the encryption key,
they can decrypt the received data to acquire an image
just like the original one, but cannot extract the additional
data.
Keywords: Reversible Data Hiding, Histogram, Stenography,
Performance, Watermarking.
I. INTRODUCTION
In an interactive buyer–seller protocol for invisible
watermarking, the seller does not know the exact watermarked
copy that the buyer receives. So the seller cannot create copies
of the original content containing the buyer’s watermark. If
ISSN: 2231-5381
the seller finds an unauthorized copy, the seller can identify
the buyer from the watermark using the unauthorized copy,
and hence the seller can prove this fact to a third party using a
dispute resolution protocol. In it is desired to transmit
redundant data over an insecure and bandwidth-constrained
channel, it is desired to first compress the data and then
encrypts it. Traditional techniques used to compress the data
first and then encrypt the data.
But we are reversing the order of these steps, thereby
first encrypting and then compressing the data. A significant
compression ratio can be achieved if compression is
Performed after encryption. Compression is performed by
standard source code and decryption by decompression.
Data hiding is referred to as a process to hide data
into cover media. This implies that the data hiding process
links two sets of data, a set of embedded data and another set
of cover media data. These two sets of data have different
applications. In covert communications, the hidden data may
often be irrelevant to the cover media. In authentication, the
embedded data is closely related to the cover media. In these
two types of applications, the invisibility of hidden data is an
important factor. In some cases of data hiding, the cover
media will experience some distortion due to data hiding and
cannot be inverted back to original media. That is, some
permanent distortion has occurred to the cover media even
after the hidden data have been extracted out. In other
applications, such as remote sensing and high-energy particle
physical experimental analysis, it is also desired that the
original cover media can be recovered because of the required
high-precision. In addition, information sharing was proposed
to protect the security of concerned data by transforming a
secret message into several shares which are then distributed
to a number of participants to keep. Such a secret sharing
scheme is useful for reducing the risk of incidental data loss
and advantageous for keeping a balance among the
participants: only when all the shares or a sufficient number of
them are collected from the participants can the secret
message be recovered correctly. This concept of secret sharing.
Conventionally, data hiding and information sharing are two
irrelevant issues in the domain of information security. In this
study, a new data hiding method based on the technique of
http://www.ijettjournal.org
Page 26
International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 1- Jan 2014
information sharing is proposed for hiding data into PNG
(portable network graphics) images.
The reversible data hiding in encrypted image is
investigated, most of the work on reversible data hiding
focuses on the data embedding/extracting on the plain spatial
domain But, in some applications, an inferior assistant or a
channel administrator hopes to append some additional
message, such as the origin information, image notation or
authentication data, within the encrypted image though he
does not know the original image content. And it is also
hopeful that the original content should be recovered without
any error after image decryption and message extraction at
receiver side. The presents a practical scheme satisfying the
above-mentioned requirements and Fig. 1 gives the sketch. A
content owner encrypts the original image using an encryption
key, and a data-hider can embed additional data into the
encrypted image using a data-hiding key though he does not
know the original content. With an encrypted image
containing additional data, a receiver may first decrypt it
according to the encryption key, and then extract the
embedded data and recover the original image according to
the data-hiding key. In the scheme, the data extraction is not
separable from the content.
II. LITERATURE SURVEY
In the literature, many data hiding methods exploring the
spatial domain and Frequency domain of images has been
proposed. Bender et al. [12] proposed The technique of leastsignificant-bit (LSB) replacement, in which a secret message
is embedded in the least significant bits of image pixel values.
Mielikainen [13] Proposed a modified LSB replacement
method which embeds as many bits as the Conventional
method, but changes less pixel values. Yang et al. [14]
proposed an Adaptive k-LSB substitution method in which
larger values of k are adopted in the Edge areas of the cover
image and smaller ones are used for the smooth areas. Wang
et al. [15] transformed image block contents into coefficients
in the frequency domain By the discrete cosine transform
(DCT) and embedded secret bits by modifying the Magnitude
relations between the AC values of image blocks. Besides data
embedding Techniques using the DCT, the discrete wavelet
transform (DWT) [17] and the discrete Fourier transform
(DFT) [18-19] have also been used.
From another viewpoint, different types of images and files
can be used as cover Media for developing data hiding [2021]. In [21], Lee and Wu proposed a lossless Data hiding
method for palette-based images, which adjusts palette colors
and image Data to embed secret data and side information for
reconstruction of the original Image content. Lee and Tsai [9]
hid data into PDF files’ characters by using special ASCII
codes. Liu [10] made use of the change tracking function in
Microsoft Word to Hide data by a document degeneration
technique.
ISSN: 2231-5381
In this paper, in addition to the aforementioned
spatial domain, frequency Domain and palettes of images for
use in data hiding, we try to explore a new Embeddable space
for data hiding, aiming at providing more data hiding
capacity, Better quality of the resulting stego-image and
stronger applicability. As a result, the PNG image with the
alpha channel plane is found to be capable of meeting these
Requirements mentioned previously. Specifically, in the
information-sharing-based Data hiding method proposed in
this study, a PNG image is used as the cover image in Which
the alpha-channel value of each pixel is set to be 255 initially.
In recent years, several researchers have revealed a
large form of image data hiding techniques in the literatures.
These techniques are often classified roughly into 3
approaches, i.e., the spatial domain, the frequency domain,
and also the compression domain. Within the spatial domain,
the cover image is altered directly and undetectably to hide the
secret message. Lee and Chen [18] proposed a steganographic
algorithm applied within the spatial domain during which the
smallest amount important bit (LSB) of every pixel within the
cover image was replaced by secret data. Later, Chang et al.
[19] found the best LSB substitution for embedding secret
data by using a dynamic programming strategy. By applying
each run-length coding and standard computation, Chang et al.
[20] designed 2 efficient data hiding ways for icon files and
grayscale files. The entire on top of ways is irreversible data
hiding schemes within the spatial domain. The reversible data
hiding scheme during this domain are often classified into 3
classes, i.e.
1) Data hiding by difference growth,
2) Data hiding by bar graph shifting, and
3) Data hiding by prediction error expansion.
In 2002, the primary distinction growth methodology
was planned [1, 2]. In 2012, Ni et al. planned the primary bar
graph shifting-based information concealment theme [3]. In
2007, Thodi and Rodriguez planned an information
concealment theme supported prediction error growth [4].
Supported the above 3 schemes, several data hiding ways [57] are planned to reinforce hiding capacity or cut back the
distortion of the stego-image. In the frequency domain, the
cover image should be preprocessed by separate cosine
transformation (DCT) [8], separate wavelet transformation
(DWT) [9], or separate Fourier remodel (DFT) [10] to induce
frequency coefficients. Once the frequency coefficients are
changed slightly to embed the secret information, the stego
image is often obtained by inversing the changed frequency
coefficients. In 2001, Fridrich et al. proposed an invertible
data hiding theme to change the quantization table by
employing a second-order operate. In 2002, chang et al.
embedded the secret data into the mid-frequency coefficients.
Next, Xuan et al utilized a reversible scheme to engraft
information into the high-frequency DWT coefficients with
bar graph modification.
http://www.ijettjournal.org
Page 27
International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 1- Jan 2014
In 2007, Chang Jiang et al.presented a lossless
embedding theme for JPEG pictures. In the compression
domain, the secret data are embedded by the alteration of the
compression code. Through the compression methodology,
the scale of the digital image information is often reduced
considerably. Actually, we have a tendency to transmit digital
image data within the compression format in our standard of
living. Many researchers have interest in hiding data within
the compression domain. Among compression Techniques,
like JPEG, JPEG2000, VQ, and block truncation coding
(BTC), VQ is a simple and efficient methodology that's wide
used. Chang Jiang et al. proposed a reversible, data hiding
algorithmic program based on the SMVQ. Within the same
year, Yang et al. planned AN MFCVQ based, reversible
watermarking theme by using four adjacent blocks to code the
present block. However, the visual quality and hiding
capability of yang et al.’s scheme weren't sensible enough. In
2009, Chang Jiang et al. used the conception of joint
neighboring coding (JNC) within the VQ index table for
embedding secrets with changeability. During this paper, a
completely unique information hiding scheme based on the
VQ codebook is explored. The proposed method uses a
codebook that has been resorted by PCA (principle component
analysis) and exploits the gap of two codeword’s, which are
just like one image block, to embed the secret information. In
keeping with the key to be embedded and also the difference
between those 2 codeword’s, the initial image block is
reworked into a difference variety table that's compressed by
entropy coding before causing to the receiver. At the receiver
finish, once cryptography the compressed code, the key
information are often extracted, and also the image are often
recovered as a VQ compressed image.
III. PROPOSED METHODOLOGY
The proposed scheme uses AES encoding
algorithmic program that uses an equivalent keys for each
encoding and decryption. AES is AN iterated block cipher
with a set block size of 128 and a variable key length. AES
uses variable variety of rounds that are fastened. The key
growth algorithmic program is based on the assumption of a
128 bit key. AES calls for a bigger variety of rounds once we
use a key length aside from 128 bits. The key expansion
algorithmic program should obviously generate an extended
schedule for the 12 rounds needed by a 192 bit key and also
the fourteen rounds needed by a 256 bit keys. If a change in
one bit of the encoding key happens it'll have an effect on the
spherical key for many rounds. The key expansion algorithm
ensures that AES has no weak keys throughout every round;
following operations are performed on every state
1.
2.
3.
Sub Bytes: each byte within the state is replaced by
another one, using the S-Box.
Shift Row: each row within the 4x4 array is shifted a
particular quantity to the left.
Mix Column: a linear transformation on the columns
of the state.
ISSN: 2231-5381
4.
Add round Key: each byte of the state is combined
with a byte key.
3.1 THE SUBSTITUTE BYTES STEP
This is a computer memory unit-by-byte substitution
and also the substitution byte for every input byte is found by
using the lookup table. The scale of the lookup table is 16 ×
16. To seek out the substitute byte for a given input byte, we
have a tendency to divide the input byte into 2 4-bit patterns,
every yielding A whole number price between 0 and 15. We
are able to represent these whole number values by their hex
values zero through F. is one amongst the hex values
employed as a row index and also the alternative as a column
index for reaching into the 16×16 lookup table. The entries
within the lookup table are constructed by a mix of GF (28)
arithmetic and bit mangling. The goal of the substitution step
is to reduce the correlation between input bits and output bits
at the byte level. The bit mangling a part of the substitution
step ensures that the substitution can't be described within the
variety of evaluating a simple mathematical function. We
have a tendency to initial fill every cell of the sixteen ×
sixteen table with the byte obtained by joining along its row
index and also the column index. we next replace the worth in
every cell by its multiplicative inverse in GF (28) supported
the irreducible polynomial x8+x4+x3+x+1. The value 00 is
replaced by itself since this component has no inverse. Let’s
represent a byte stored in each cell of the table by
b7b6b5b4b3b2b1b0 wherever b7 is that the msb and b0 the
LSB. Therefore, the bit pattern stored 9 cells with row index
nine and column index 9 is 10001010, showing that b7 is 1
and b0 is 0.
This byte-by-byte substitution step is reversed throughout
decryption. The 16×16 lookup table for decryption is
constructed by beginning get into an equivalent manner as for
the encryption lookup table.
3.2 THE SHIFT ROW STEP
The Shift Row transformation consists of
1.
2.
3.
4.
Not shifting the primary row of the state array at any
condition.
Circularly shifting the second row by one byte to the
left side.
Circularly shifting the third row by two bytes to the
left side.
Circularly shifting the last row by three bytes to the
left facet.
The input block is written in column-wise manner. That’s the
primary four bytes of the input block fill the primary column
of the state array and also the next four bytes the second
column then on. For secret writing, the encoding steps are
shifted in only the other fashion. At the start the primary row
is left unchanged. The second row is shifted to right by one
byte and also the third row to right by 2 bytes and also the last
http://www.ijettjournal.org
Page 28
International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 1- Jan 2014
row to right by 3 bytes. All shifts performed are circular
manner.
3.3 MIX COLUMN STEP
This step replaces every byte of a column by a function of all
the bytes within the same column. additional exactly, every
byte in an exceedingly column is replaced by twice that byte,
and three times successive byte, and the byte that comes next,
and the byte that follows. The words ‘next’ and ‘follow’
discuss with bytes within the same column, and there that
means is circular, within the sense that the byte that's next to
the one within the last row is that the one within the initial
row. This stage called round Column is largely a substitution
however it makes use of arithmetic of GF (28). Every column
is operated individually. Every byte of every column is
mapped into a brand new value that's a function of all four
bytes within the column.
3.4 ADD ROUND KEY TRANSFORMATION
This stage called AddRoundKey uses the 128 bits of
state and is bitwise XORed with the 128 bits of the round key.
This operation is performed in column wise manner. This
transformation is as easy as possible which helps in efficiency
but it affects every bit of state.
3.5 IMAGE ENCRYPTION
Assume an original image is within uncompressed
format and every pixel with gray value falling directly into
[0, 255] is presented by 8 bits.
Ba,b,c= ba,b,cΦ ra,b,c
where ra,b,c are determined by an encryption key by
using a standard stream cipher. Then, Ba,b,c are concatenated
orderly since the encrypted data. Various of secure stream
cipher methods might be used here to make sure which
anyone without the encryption key, say for example a
potential attacker or even the data hider, cannot acquire any
information regarding unique content through the encrypted
data.
3.6 DATA EMBEDDING
Within the data embedding phase, some parameters
are embedded right into a small number attached with
encrypted pixels, and furthermore the particular LSB with the
other encrypted pixels are compressed to generate a space for
accommodating a further data along with the original data at
the positions occupied through the parameters. The detailed
procedure can be as follows In accordance with a data-hiding
key, the data-hider pseudo-randomly selects Np encrypted
pixels that may be utilized to hold the parameters for data
hiding.
ISSN: 2231-5381
Here, Np is really a small positive integer, for instance,
Np=20. The other (N-Np) encrypted pixels are pseudorandomly permuted and divided into a variety of groups, each
and every of which contains L pixels.
The permutation way is usually dependant on the data-hiding
key.
For every pixel-group, gather the M the very least
considerable items of the L pixels, as well as denote them as B
(k,1) , B (k,2) …… B(k,M*L) in which k can be a group
index within [1,(N-Np)/L] and M is generally a positive
integer less than 5. The data-hider also generates a matrix G
sized (M*L – S) * M*L, that is consists of two parts.
The left part will be the identity matrix as well equally the
suitable part is pseudo-random binary matrix produced from
the data-hiding key.
For each and every group , which can be product with all the
G matrix to create a matrix of size (M * L-S). That includes a
sparse bits involving size S, when the information is
embedded as well as organize the pixels in to the original
form and repermutated to create a original image.
3.7 DATA EXTRACTION
When the particular receiver has both data-hiding, he might
make an effort to extract the embedded data Based on the
data-hiding key, the values of M,L and S, the original LSB
from the Np chosen encrypted pixels, as well as the (N-Np) *
S/L - Np further bits might be extracted in the encrypted
image containing embedded data. By putting the particular
Np LSB within their original positions, the encrypted data
with the Np determined pixels are retrieved, and their
particular original gray values might be correctly decrypted
while using the encryption keys. Within the following, we are
going to recover the initial gray values with the other (N-Np)
pixels.
This specific paper proposes a new novel scheme for
separable reversible data hiding in encrypted image. Within
the proposed scheme, the initial image is encrypted having an
encryption key as well as the additional data are embedded in
the encrypted image by using a data-hiding key. Through an
encrypted image containing additional data, in the result the
receiver only has the data-hiding key, he is able to acquire the
extra data though he doesn't are aware of the image content. In
case he's got just the encryption key, he is able to decrypt the
received data to have an image exactly like the original one,
but cannot extract the embedded additional data. In the event
the receiver has both the data-hiding key and also the
encryption key, they can extract the additional data and
recover the initial image without the error if the amount of
additional data will be not too big.
http://www.ijettjournal.org
Page 29
International Journal of Engineering Trends and Technology (IJETT) – Volume 7 Number 1- Jan 2014
IV. CONCLUSION
In this particular paper, a new scheme intended for separable
reversible data hiding in encrypted image is proposed, which
often includes image encryption, data embedding as well as
data-extraction/image recovery phases. Within the first phase,
this content owner encrypts the initial uncompressed image
having an encryption key. Although a data-hider will not
really know the dimensions as well as original written content,
they may compress the smallest amount involving significant
bits of the encrypted image employing a data-hiding step to
make a new sparse space to accommodate the additional data.
By having an encrypted image containing additional data, the
receiver may extract a further data only making use of the
data-hiding key, or get the image just like the original one
only using the encryption key. Once the receiver has each of
the keys, they can extract the additional data and recover the
original content without any error by exploiting the spatial
connection in normal image within the event the quantity of
more data is not too big. When the lossless compression
technique is useful for the encrypted image containing
embedded data, the additional data may be still extracted as
well as the original content can as well be recovered
considering that the lossless data compression will not affect
the content with the encrypted image containing embedded
data. However, the lossy compression method in suitable for
encrypted images produced by pixel replacement just isn't
suitable here considering that the encryption is performed by
bit-XOR operation. Later on, a comprehensive combined
image encryption and data hiding suitable for lossy
compression should get further study
REFERENCES
[1]. G.Braudway, K. Magerlin. And F. Mintezer. "protecting
publicity available images with a visual image watermark,"
Proc. SPIE: optical security and Counterfeit Deterrence
Techniques, Vol. 2659. pp.126-133, 1996.
[2]. B.Macq and J.Quisquater. "Cryptology for Digital TV
broadcasting," Proc. Of IEEE. Vol. 83. No.6, pp 944-957,
June 1995.
[3]. W. Zeng, “Digital watermarking and data hiding:
technologies and applications,” in Proc. Int. Conf. Inf. Syst.,
Anal. Synth., vol. 3, pp. 223–229, , 1998.
[4]. N. Zhichenge, ,Y. Q. Shi,N. Ansari, and W. Su,“
Reversible Data Hiding” IEEE Transactions on circuits and
systems for video technology, vol.16, No. 3, March 2006.
[5]. J. Cox, J. Kilian, T. Leighton, and T. Shamoon, “Secure
spread spectrum watermarking for multimedia,” IEEE Trans.
Image Process., vol. 6, no. 12, pp. 1673–1687, Dec. 1997.
ISSN: 2231-5381
[6]. Z. Tirkel, C. F. Osborne, and R. G. Van Schyndel, “Image
watermarking a spread spectrum application,” in Proc. IEEE
4th Int. Symp. Spread Spectrum Techn. Applicat., vol. 2, pp.
785– 789, Sep. 1996.
[7]. A. van Leest, M. van der Veen, and F. Bruekers,
“Reversible Image Watermarking,” in Proc.
Int. Conf. Image Processing, Vol. 2, pp. 731−734, 2003.
[8]. J. Huang and Y. Q. Shi, “An adaptive image
watermarking scheme based on visual masking,”
Electron. Lett., vol. 34, no. 8, pp. 748–750, 1998.
[9] I. S. Lee and W. H. Tsai, A new approach to covert
communication via PDF Files, Signal Process. 90 (2) (2009)
557-565.
[10] T. Y. Liu and W. H. Tsai, A new steganographic method
for data hiding in Microsoft Word documents by a change
tracking technique, IEEE Transactions on Information
Forensics and Security 2 (1) (2007) 24-30, 2007.
[12] W. Bender, D. Gruhl, N. Morimoto and A. Lu,
Techniques for data hiding, IBM Systems Journal 35 (3-4)
(1996) 313-336.
[13] J. Mielikainen, LSB matching revisited, IEEE Signal
Processing Letters 13 (5)
(2006) 285-287.
[14] C. H. Yang, C. Y. Weng, S. Wang and H. M. Sun,
Adaptive data hiding in edge areas of images with spatial LSB
domain systems, IEEE Transactions on Information Forensics
and Security 3 (3) (2008) 488-497.
[15] Y. N. Wang and A. Pearmain, Blind image data hiding
based on self reference,Pattern Recognition Letters 25 (15)
(2004) 1681-1689.
[16]. C. W. Honsinger, P. Jones, M. Rabbani, and J. C.
Stoffel, “Lossless Recovery of an Original Image Containing
Embedded Data,” U.S. Patent 6 278 791 B1, Aug. 21, 2001.
[17] S. H. Wang and Y. P. Lin, Wavelet tree quantization for
copyright protection watermarking, IEEE Trans. Image
Processing, 13 (2) (2004) 154-165.
[18] C. M. Pun, A novel DFT-based digital watermarking
system for images, Proceedings of 8th Int. Conf. on Signal
Processing, Guilin, Yunnan, China, 2006, pp. 1245-1248.
[19] S. Pereira and T. Pun, Robust template matching for
affine resistant image watermarks, IEEE Trans. on Image
Process. 9 (6) (2000) 1123-1129.
[20] L. S. T. Chen, S. J. Lin and J. C. Lin, Reversible JPEGbased hiding method with high hiding-ratio, Int. Journal of
Pattern Recog. and Artificial Intelligence, 24 (2010) 1-23.
[21] J. H. Lee and M. Y. Wu, Reversible Data-hiding method
for palette-based images, Optical Engineering, 47 (2008)
047008-1-047008-9.
http://www.ijettjournal.org
Page 30
Download