A Robust Intensity Based approach for Images Steganography Renu Singla,

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015
A Robust Intensity Based approach for Images
Steganography
1
Renu Singla, 2Mitali
1
Asst. Prof (CSE) ,Shri Ram College of Engg.,Palwal, India
2
M.Tech(CSE),Shri Ram College of Engg.,Palwal, India
Abstract:
In this paper, A new technique is proposed
based on pixel intensity. The idea is based on the fact
that even little distortion induced in an image may be
noticeable if the color of pixel lies in the range to which
human eye is highly sensitive. The new technique will
target only those pixels to which human eye is less
sensitive. This may however decrease the data hiding
capacity but it will result in increased robustness.
Keywords: image, intensity, robust, color, substitution.
I.
INTRODUCTION
The increasing rate of usage of internet and
the revolution that occurred in digitization of
information; the overall structure of modern
communication is changed. The revolution in
software industry and semiconductor industry made it
feasible that hardware as well as software are more
user-friendly and flexible and enables consumers to
communicate multimedia data. Peoples are now able
to transmit large multimedia files through broadband
connection. Moreover, the transmission thus done is
almost errorless [2]. Security of data to transmit is of
high concern in today’s communication system. Data
hiding is a technique of providing data security.
Steganography is the art and science of hiding
information such that its presence cannot be
detected[1]. The secret information is hidden in some
carrier file and then transmitted. The carrier file can
be an image, Audio file, text file, video file, etc.
On the basis of cover file used for embedding, the
steganography techniques are divided into different
ISSN: 2231-5381
categories. The focus will be on using image as cover
file in this paper.
II. SUBSTITUTION TECHNIQUE OF STEGANOGRAPHY
Initially steganographic systems were
developed for digital images and video
The substitution technique is based on
the idea that if a single bit or a few bits in each image
pixel are replaced with the message bits then the
change thus occurred will not be noticeable to the
human eye (type of file matters). The capacity of this
method is very high (41,000 bps). The robustness of
this method is very low. This method is however easy
to implement but susceptible to various attacks.
The prime reason for choosing this
technique lies in the advantage of using substitution
technique which is a very high capacity for hiding a
message. When only single LSB replacement is done
per host audio sample a capacity of 44.1 kbps can be
achieved. However there are certain other techniques
like spread spectrum (4 bps) having lesser capacity
but they are more robust. [10].
III.
MOTIVATION
STATEMENT
AND
PROBLEM
Steganography is a technique of sending secret
messages by hiding in a carrier such that the
existence of the message is concealed. Only the
intended recipient is aware of the existence of the
message. If any other is aware of the existence of the
message in carrier then the purpose of Steganography
is revealed.
http://www.ijettjournal.org
Page 346
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015
LSB method of Steganography is very simple and
easy to implement. But at the same side it is easy to
detect also. A person can get the LSB’s of each pixel
an analyze them whether it gives some meaningful
message or not. Moreover the replacement of LSB of
the pixel with the message bits will produce a little
change in image. This change may be observable
with the human eyes if the pixel is of greenish-yellow
color as human eye is most sensitive to this color.
Among the eyes of Nature, the human eye is
designed to distinguish colors. Cats eyes, for example
are much better at detecting movement, the condor
can see "death", and the dog can "read" our faces
better than human can. But for colors, human seem to
have the leading specimen eye. And among the
colors, which ones do our eyes seem most keen to
observe? The 400 to 700 nm range of wavelengths is
called "visible" because those are the wavelengths to
which our eyes are sensitive. That range reflects the
wavelengths of sunlight which reach the Earth's
surface with sufficient intensity to excite the cells on
our retina. The physical process of seeing begins with
the absorption of a photon by a pigment called
"retinal" [5].
Our motive is to find out the pixels whose color lies
in other regions of the figure except region 1 and 2.
In order to locate such pixels, following table was
referred.
From figure, it is clear that human eye is most
sensitive to green color and more than 70% sensitive
to greenish yellow color. Thus a slight change in the
pixel of intensity lying between 520nm-600nm may
be observable to the human eye.
IV. Proposed Work
This project is developed for hiding information in
any image file. The scope of the project is
implementation of steganography tools for hiding
information includes any type of information file and
image files and the path where the user wants to save
Image and extruded file.
The Selection of pixels on the basis of their intensity
is done using following algorithm:
ISSN: 2231-5381
http://www.ijettjournal.org
Page 347
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015
human eye is most sensitive to this color. Using only
select_pixel(Red,Green,Blue)
those pixels to hide information to which our eye is
Input Parameters:
less sensitive can be a better approach so that the
Red
// Red component of pixel
Green
// Green component of pixel
Blue
// Blue component of pixel
change occurred after LSB insertion should not be
observable by human eye. The histograms of cover
image and stego image was obtained for comparison.
Return Value:
integer
otherwise 1
// 0, if pixel is less sensitive to eye
integer select_pixel(Red,Green,Blue)
{
integer flag=1
// 0-less sensitive
if((R=0)AND(B=0) AND(G>0)) then
Figure: Histogram of Cover Image
flag=0
//high sensitive to eye
else if ((B=0) AND (R>192) AND (G>162))
then
flag=0
//high sensitive to eye
else
flag=1
//less sensitive to eye
return(flag);
}
V. RESULT & CONCLUSION
However the replacement of LSB of the pixel with
the message bits will produce a little change in
Figure: Histogram of Stego Image
image. This change may be observable with the
human eyes if the pixel is of greenish-yellow color as
ISSN: 2231-5381
http://www.ijettjournal.org
Page 348
International Journal of Engineering Trends and Technology (IJETT) – Volume 23 Number 7- May 2015
[10]. Fridrich, Jessica., Goljan, Miroslav., and Du, Rui.
REFERENCES
[1]. Rohit Tanwar, Sunil Kumar, Narender Gautam,
Ravinder Gautam,” A Spatial Domain Steganography
Technique Based on Optimal Solution Using Genetic
Algorithm”, January 2013,Page(s):228-232.ISBN:97893-81583-82-1
[2]. Gunjan Nehru, Puja Dhar,”A detailed look of audio
steganographic techniques using LSB and Genetic
Algrithm approach”, IJCSI Vol.9, Issue1, No.2, January
[3]. Westfeld, Andrew. F5-a steganographic algorithm: high
steganalysis. In Proceedings of
the 4th Information Hiding Workshop, volume 2137
[4]. Fridrich, J., Feature-based steganalysis for jpeg images
and its implications for future design of steganographic
schemes. In Proceedings of the 6th Information Hiding
Workshop, volume 3200 of LNCS, pages 67{81.
[5]. Yu, Lifang., Zhao, Yao., Ni, Rongrong., and Shi, Yun
Q. A high-performance yass-like scheme using
randomized big-blocks. In Proceedings of the IEEE
International Conference on Multimidea & Expo
[11]. Dumitrescu, S., Wu, X. L., and Wang, Z. Detection of
lsb steganography via sample pair analysis. IEEE
Transactions on Signal Processing, 51(7):1995{2007,
[12]. Fridrich, J., Goljan, M. On estimation of secret
message length in lsb steganography in spatial
domain. In IS&T/SPIE Electronic Imaging: Security,
Contents VI, volume 5306, pages 23{34. SPIE, 2004.
[13]. Ker, A.D. Fourth-order structural steganalysis and
analysis
of
cover
assumptions.
In
IS&T/SPIE
Electronic Imaging: Security, Steganography, and
[6]. Huang, Fangjun., Huang, Jiwu., and Shi, Yun Qing. An
experimental study on the
security performance of
yass. IEEE Transactions on Information Forensics and
[14]. Harmsen, J., Pearlman, W. Steganalysis of additive
noise modelable information hiding. In IS&T/SPIE
Electronic Imaging: Security, Steganography, and
5020, pages 131{142. SPIE, 2003.
[15]. Huang, Jinggang., Mumford, David. Statistics of
natural images and models. In Proceedings of IEEE
Computer Society Conference on Computer Vision
Security, 5(3):374 { 380, 2010
[7]. Sallee, P.. Model-based steganography . In Proceedings
Internation
6072, pages 1{14. SPIE, 2006.
Watermarking of Multimedia Contents V, volume
(ICME 2010), 2010.
2nd
pages 27{30. ACM Press, 2001.
Watermarking of Multimedia Contents VIII, volume
Springer, 2004.
the
workshop on Multimedia and security: new challenges,
Steganography, and Watermarking of Multimedia
of LNCS, pages 289{302. Springer, 2001.
of
grayscale images. In Proceedings of 2001 ACM
2003.
2012 ISSN(online): 1694-0814.
capacity despite better
Reliable detection of lsb steganography in color and
Workshop
on
Digital
and Pattern Recognition, volume 1, pages 541{547,
1999
Watermarking, volume 2939 of LNCS, pages 154{167.
Springer, 2003.
[8]. Al-Ataby, Ali., Al-Naima, Fawzi. A modified high
capacity image steganography technique based on
wavelet transform. The International Arab Journal of
Information Technology, 7:358–364, 2010.
[9]. Westfeld, A., Ptzmann, A. Attacks on steganographic
systems - breaking the steganographic utilities ezstego,
jsteg, steganos, and s-tools-and some lessons learned. In
Proceedings of the 3rd Information Hiding Workshop,
volume 1768 of LNCS, pages 61{76. Springer, 1999.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 349
Download