Implementation of Digital Image Steganography Using ADSP BF532 Processor

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
Implementation of Digital Image Steganography
Using ADSP BF532 Processor
P.D.Gadekar1, S.K.Waghmare2
1
2
G.H.R.C.O.E.M Chas, Ahmednagar, India
Department of Electronics Engineering, GHRCEM, Wagholi, Pune, India
Abstract— Hide the information means inserts secret data into a
cover file, so that the existence of data is not visible. Today
information hiding techniques used are watermarking and
Steganography. In watermarking we have to protect the
ownership of a digital content. In steganography secret messages
embed into digital content so the secret messages are not
detectable. In Steganography some techniques are irreversible,
means original image cannot be recovered from stego image. An
original image can be completely recovered from the stegoimage after extraction of secret data is known as reversible
Steganography. This technique has been focused on spatial
uncompressed domain which include Least Significant Bit
algorithm (LSB). In this, we propose a lossless, compressed
domain Steganography technique for compressed images based
on the Discrete Wavelet Transform (DWT). The stego-image
preserves the same image quality as the original compressed
images. The experimental results show that the proposed method
is not only easy to implement but also gives high payload
(capacity) in the cover image with very little error.
cover image with the secret message bits.LSB is the most
preferred technique used for data hiding because it is simple to
implement offers high hiding capacity, and provides a very
easy way to control stego-image quality [2]
The other type of hiding method is the transform domain
techniques which appeared to overcome the robustness and
imperceptibility problems found in the LSB substitution
techniques. There are many transforms that can be used in
data hiding, the most widely used transforms are; the discrete
cosine transform (DCT) the discrete wavelet transform (DWT)
and the discrete Fourier transform (DFT). Most recent
researches are directed to the use of DWT since it is used in
the new image compression format JPEG2000 and MPEG4,
In [9] the secret message is embedded into the high frequency
coefficients of the wavelet transform while leaving the low
frequency coefficients sub band unaltered.
Keywords— Steganography, discrete wavelet transform, spatial
domain, Least Significant Bit (LSB) algorithm.
II. DISCRETE WAVELATE TRANSFORM(DWT)
It stores the information in an image and removes noise
efficiently. By using multi-resolution technique different
frequencies are analysed with different resolutions. Wavelets
are localized waves which have their energy concentrated in
time or space for analysis of transient signals. A fast
computation of wavelet transforms which is easy to
implement and reduces the computation time and resources
required is DWT which based on sub-band coding. [6]
A. Wavelet Family
There are different basic functions we can use as the mother
wavelet for wavelet transformation. Through translation and
scaling the mother wavelet produces all wavelet functions
used in the transformation, so it determines the characteristics
of the resulting wavelet transform. Therefore, based on the
particular application the appropriate mother wavelet should
be chosen. Among different types of wavelet families such as
Haar, Daubechies4, Coiflet1, Symlet2, Meyer, Morlet,
Mexican Hat etc we use Haar Wavelet transform
B. Haar Wavelet Transform
In proposed system we are using Haar Wavelet type
because it is the simple among all. In this the low frequency
wavelet coefficients are generated by averaging the two pixel
values. High frequency coefficients are generated by taking
I. INTRODUCTION
Steganography is defined as the art and science of hiding
secret information (data) in any digital file (plain sight) within
a cover data so that the information can be securely
transmitted over a network. Steganography word is originated
from two Greek words steganos and graphia means "covered
writing". From ancient times romans and ancient Egyptians
used Steganography. We can use any digital file such as
image, video, audio, text or IP packets to hide secret message.
Generally the file used to hide data is referred to as cover
object, and the term stego-object is used for the file containing
secret message.
Image files are the most popular cover objects due to the
redundancy of digital information, representation of an image
data they are easy to find and have higher degree of distortion
tolerance with high hiding capacity. According to the format
of the cover image or the method of hiding, we have two
popular types of hiding methods; spatial domain embedding
and transform domain embedding.
The Least Significant Bit (LSB) substitution is an example
of spatial domain techniques. The basic idea in LSB is the
direct replacement of LSBs of noisy or unused bits of the
ISSN: 2231-5381
http://www.ijettjournal.org
Page 3752
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
half of the difference of the same two pixels. The four bands
obtained are LL, LH, HL, and HH which is shown in Fig 1.
The LL band is known as approximation band, consists of low
frequency wavelet coefficients, which consist of significant
part of the spatial domain image. The other bands are called as
detail bands which consist of high frequency coefficients and
contain the edge details of the spatial domain image.
Step1: Column wise processing to get H and L
H = (Co¯ Ce)
L = (Ce-[H /2])
Where Co: odd column , Ce: even column pixel values.
Step 2: Row wise processing to get LL, LH, HL and HH,
Separate odd and even rows of H and L,
Namely, Hodd– odd row of H
Lodd– odd row of L
Heven – even row of H
Leven – even row of L
LH = Lodd – Leven
LL = Leven– LH/2
HL = Hodd– Heven
HH = Heven -HL/2
IV. PROPOSED SYSTEM
Figure 2 shows the hardware interface of our system. We
are using BF532 processor. There are two parts of the process
first part is embedding and other is extraction.
(1)
(2)
(3)
(4)
(5)
(6)
III. LEAST SIGNIFICANT BIT (LSB) ALGORITHM
The LSB is an example of spatial domain techniques. In
LSB we directly replace LSBs of noisy or unused bits of the
cover image with the secret message bits. It is the most
preferred technique used to hide the data because it is simple
to implement and have high hiding capacity. Also easily
control stego-image quality. [2] But it has low robustness to
modifications made to the stego-image such as low pass
filtering and compression [3] and also low imperceptibility.
Algorithms using LSB in grayscale images can be found in [4,
5, 6].
To overcome the robustness and imperceptibility found in
the LSB substitution techniques the transform domain
technique is used. Different types of transforms that can be
used in data hiding, among which mostly used transforms are;
the discrete cosine transform (DCT), the discrete wavelet
transform (DWT) and the discrete Fourier transform (DFT).
The DWT is mostly preferred because it is used in the new
image compression format JPEG2000 and MPEG4. In [9] the
secret message is embedded into the high frequency
coefficients of the wavelet transform while leaving the low
frequency coefficients sub band unaltered.
In this paper, an image file with “.jpg” extension has been
selected as host file. It is assumed that the least Significant
bits of that file should be modified without degrading the
image quality.
There are 3 types of this algorithm:
ISSN: 2231-5381
1) 2 pixel per character
2) 4 pixel per character
3) 8 pixel per character
As move on from first type to last type the data hiding
capacity decreases but quality of image increases.
Figure 2. The Hardware interface diagram of proposed
system
A. Embedding
From personal computer we are getting input image as
cover image then giving that to processor It process that
image. In that firstly it compress the image with the help
of Discrete Wavelet transform (DWT).Then in that
compressed image embed the secret data which we have to
passed to get stego image. This embedding process is done
with the help of Least Significant Bit (LSB) algorithm.
Then apply Inverse Discrete Wavelet Transform (IDWT)
to get Stego image.
B. Extraction
After getting stego image at transmitter, at receiver exactly
reverse process is done. On stego image apply DWT then
extract secret data. Finally we get our original image.
V. FLOW DIAGRAM
Embedding:
http://www.ijettjournal.org
Page 3753
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
(8)
Where R is the maximum fluctuation in the input image data
type.
As we know ideally MSE value should be small and
PSNR value should be very high.
Extraction:
Figure 3. The flow diagram of proposed system
Step 1. First we take input image as cover image in .jpg
format.
Step 2. Then apply discrete wavelet transform mechanism to
compress the image.
Step 3. With the help of LSB algorithm, embed the secret
data and compress image. After embedding apply IDWT to
get stego image at transmitter side.
Step 4.Exactly reverse process is done at the receiver side.
On stego image apply DWT.
Step 5.Then we are extracting secret data from stego image.
Step 6.In validations we are calculate the MSE and PSNR
values.
VI. VALIDATIONS
In validation we are taking some snapshots of our
project demo also calculating Mean Square Error (MSE) and
Peak Signal to Noise Ratio (PSNR) values.
In stego image a performance is measured by means of
two parameters namely, Mean Square Error (MSE) and Peak
Signal to Noise Ratio (PSNR)
The MSE is calculated by using the equation,
Figure 4. Snapshot of Lena Image
Figure 5.Snapshot of Flower Image
(7)
Where M : number of rows and N : number of columns in the
input image.
The PSNR calculated using the following equation:
ISSN: 2231-5381
http://www.ijettjournal.org
Page 3754
International Journal of Engineering Trends and Technology (IJETT) – Volume 4 Issue 9- Sep 2013
ACKNOWLEDGEMENT
We take this opportunity to gratefully acknowledge the
inspiration, encouragement, guidance, help and valuable
suggestions received from all our well-wishers. We would like
to thank our Project guide Prof. S. K. WAGHMARE who
have helped us and made available much useful information to
complete this project report.
We also thankful to Prof. S. P. BHUMKAR who has
given valuable support. Without their complete support and
willing co-operation, this would not have been possible. We
are forever obliged to our parents and friends for their
encouragement to us and faith in our ability to succeed.
REFERENCES
Figure 6.Snapshot of Rose
Table shows MSE and PSNR values for different images.
Table1.Some Experimental Results
Sr.No.
Image
MSE
1
Lena
0.0938
2
Flower
0.0859
3
Rose
0.0830
PSNR
58.411
58.7890
58.9396
VII.
CONCLUSION
This technique has two main objectives firstly that
Steganography should provide the maximum hiding
capacity and the embedded data must be imperceptible to
the observer. It was found that both objectives are fulfilled
by proposed method which gives high capacity in the
cover image with very little error.
ISSN: 2231-5381
[1] Abbas Cheddad, Joan Condell, Kevin Curran, Paul Mc Kevitt, ”Digital
image Steganography: Survey and analysis of current methods Signal
Processing”, 90 (2010),727–752.
[2] C.K. Chan, L.M. Chen, “Hiding data in images by simple LSB
substitution”, Pattern recognition, 37 (3) (2004), 469–474.
[3] R.Amirtharajan, Adarsh D, Vignesh V and R. John Bosco Balaguru,
“PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity
Steganography”, International Journal of Computer Applications
7(9),(October 2010),31–37.
[4] R.O. EI Safy, H. H. Zayed, A. EI Dessouki, “An Adaptive Steganography
Technique Based on Integer Wavelet Transform”, International conference on
Networking and media convergence
ICNM-(2009),111 - 117.
[5] Guorong Xuan; Jidong Chen; Jiang Zhu; Shi, Y.Q.; Zhicheng March,
2011 Ni; Wei Su,” Lossless data hiding based on integer wavelet transform” ,
IEEE Workshop on Multimedia Signal Processing,Vol.2,( 2002), 29-32.
[6] Po-Yueh Chen and Hung-Ju Lin, “A DWT Based Approach for Image
Steganography”, International Journal of Applied Science and Engineering
4,(2006), 275-290.
[7] Saeed Sarreshtedari and Shahrokh Ghaemmaghami, “High Capacity
Image Steganography in Wavelet Domain”, IEEE CCNC 2010
proceedings,(2010),1-5.
[8] Cheng jiang Lin, Bo Zhang, Yuan F. Zheng,” Packed Integer Wavelet
Transform
Constructed by Lifting Scheme”, IEEE Transactions on Circuits
and Systems for Video Technology, (Dec 2000), 1496 – 1501
[9] P. Chen, and H.Lin, "A DWT Approach for bnage Steganography,"
International Journal of Applied Science and Engineering 2006. 4, 3:
275:290.
[10] B.Lai and L. Chang, "Adaptive Data Hiding for bnages Based on Harr
Discrete Wavelet transform," Lecture Notes in Computer Science, Volume
4319/2006
http://www.ijettjournal.org
Page 3755
Download