Novel and Secure Image Steganography Using OPVD with High Capacity V. Navya

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 3 – Aug 2014
Novel and Secure Image Steganography Using
OPVD with High Capacity
V. Navya1
T.Ravi Kumar Naidu2
T.V.S. Gowtham Prasad3
PG Student, Dept. of ECE, SVEC, Tirupati, Andhra Pradesh1
Assistant Professor, Dept. of ECE, SVEC, Tirupati, Andhra Pradesh2
Assistant Professor, Dept. of ECE, SVEC, Tirupati, Andhra Pradesh3
Abstract--This paper proposes a new high payload
capacity
steganographic
(octonary
pixel
value
scheme
using
differencing)
OPVD
with
high
statistical un-detectability and perceptual quality.
The novel algorithm performs pairing a pixel with all
of its neighbors in all the eight directions to increase
the embedding capacity and the number of bits
Steganography techniques
domain
and
frequency
domain
are
spatial
techniques.
Frequency domain techniques are more complex
than
spatial
domain
techniques.
Many
steganographic methods are proposed in spatial
domain. The basic steganography technique in
embedded in each pixel is based on the nature of its
spatial domain is LSB replacement[3], where the
region. Experimental results show that the proposed
least significant bit in each pixel of image is
algorithm is secure, with high capacity and very low
replaced with the secret message bit. The change in
degradation. Also, the performance of the method is
LSB bit results un-detectability and less hiding
compared with PVD and tri way PVD steganography
capacity.
techniques.
The
quality of
the
steganography
measured based on PSNR and maximum hiding
capacity.
Keywords--Image
steganography,
hiding
capacity,
Digital
get the hiding capacity in those pixels. It hides
INTRODUCTION:
images
are
the
numeric
representation of a two-dimensional image which
led to the development of many steganographic
techniques. A steganographic method is judged by
its hiding capacity(the maximum size of secret data
that is embedded inside an image) and statistical
un-detectability(stego image is more similar to that
of original
image).
scheme is PVD (pixel value differencing)[1]. It
calculates difference value between two pixels to
Octonary PVD, Un-detectability.
I.
The other category of steganography
A good steganographic
technique sustains both maximum hiding capacity
and un-detectability. Typically, with the increase in
more information in edge regions than smooth
regions, which results good hiding capacity with
reduced artifacts. Tri way PVD is extension of
PVD technique which increase the hiding capacity
by calculating the difference of pixels in three
directions.
A novel steganography technique is
proposed which is extension of PVD to enlarge the
hiding capacity and to sustain the un-detectability
concurrently.
the secret message bits introduces more artifacts in
stego image. Practical applications demand the two
properties viz., un-detectability and high payload
capacity to be carefully considered to design a
steganographic algorithm.
II.
PROPOSED METHOD:
The block diagram of proposed method is
shown in Fig.1. In the embedding side, the cover
image is divided into non-overlapping blocks of
some size and each block is shifted by an angle of
ISSN: 2231-5381
http://www.ijettjournal.org
Page 114
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 3 – Aug 2014
some degrees ɵ to obtain the shifted image. That
shifted image is used to hide the secret data to
provide
high
security
which
improves
the
perceptual quality. Again the same shifted image is
divided into non-overlapping blocks of size 3*3,
each with nine pixels in pre-processing phase. The
eight neighboring pixels form eight pixel pairs with
the center pixel. The proposed approach hide more
number of bits in edge areas than smooth
regions[5,6] so first the regions are identified to
hide the data in region identification phase.
Fig.1. Block diagram of proposed system (a)Data embedding (b)
Data extraction
Subsequently, the number of hiding bits in each
pixel pair is determined by referring range table.
As shown in Fig.2, each hiding unit has nine pixels
After utilizing all the edge regions, smooth regions
P(x, y), P(x-1,y-1), P(x-1,y), P(x-1,y+1),P(x, y-1),
are used to hide the data. The range table is
P(x, y+1), P(x+1, y-1), P(x+1, y),P(x+1,y+1) where
constructed by dividing [0 255] range into different
x and y are pixel locations in an image. Let P(x, y)
levels. Data is hidden based on OPVD algorithm.
is a center pixel with eight neighboring pixels
The exceeded pixel values are adjusted to get the
which are denoted as P0, P1, P2, P3, P4, P5, P6,
pixel values within the range in pixel readjustment
P7, P8.
phase. Finally the post processing phase is used to
obtain the stego image. In extraction, almost
P(x-1,y-1)
P(x, y-1)
P(x+1, y-1)
P(x-1,y)
P(x, y)
P(x+1, y)
P(x-1,y+1)
P(x, y+1)
P(x+1,y+1)
similar blocks are used to retrieve the hidden
information. The details of the data embedding and
data
extraction
procedure
of
our
proposed
algorithm are as follows.
A. Data embedding:
Preprocessing phase: The cover image I is divided
Range
Hiding capacity in
bits
into non-overlapping blocks of size R*R, the size
of block provides stego_key1. Each block is shifted
[0 7]
3
by an angle of {00, 900, 1800, 2700} which provides
[8 15]
3
stego_key2. While segmenting the image no pixel
[16 31]
4
is left behind for security reasons, for that the block
[32 63]
5
size must be even. If some pixels are left then that
[64 127]
6
pixels must be unhandled.
[128 255]
7
Fig.2 (a) Hiding Unit HU (b) range table RT
The resulting image denoted as RI is again
split into 3*3 non-overlapping blocks. Each block
Region identification phase: The edge regions are
is called as hiding unit HU. Hiding unit is shown in
first identified to hide the data because edge
Fig. 2(a).
regions hold more number of bits than smooth
regions to improve perceptual quality and security.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 115
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 3 – Aug 2014
Range table construction phase: The range table
provides
adaptive
hiding
capacity
and
Case
is
constructed by calculating the difference value of
pixels with their center pixel. Let the center pixel is
(
Case
upper and lower bounds in range table are
and
)
⌈ ⌉
(
⌊ ⌋)
8:
(
(i=1,2,….8). The
P0 and neighboring pixels are
7:
)
⌊ ⌋
(
⌈ ⌉)
Where
and
then the difference value is calculated as
are the new pixel values after embedding
the secret data. If the new pixel values fall out of
The hiding capacity of pixel pairs is obtained by
⌊
The width
⌋
boundary then the values are adjusted to have with
in the boundary values.
Readjustment phase: After embedding the secret
is defined as
data, the center pixel value in each hiding unit is
Hi number of bits can be hidden inside each pixel
changed eight times let the new center pixel values
pair. Read Hi number of bits from binary data and
are
transform those bits to decimal value Bi. If the
center pixel need to round off to single value to
difference value
is large then those pixels hide
form a 3*3 block accordingly the neighboring
more number of bits. The range table for proposed
pixels are changed. The center pixel value is round
method is shown in Fig. 2(b).
off as
OPVD embedding phase: Embed
remainder is to be calculated to find the new values
)
. The
)
The neighboring pixel values are defined as
where
. Now
hiding units with secret information are formed
.The remainder is obtained as
(
((∑
number of bits
in hiding unit by altering the pixels P0 and Pi. The
of P0 and
and new neighboring pixels are
with the changed pixel values.
)
Where
Post processing phase: After embedding the secret
The optimal approach to alter pixels is as
data, all hiding units are combined to form stego
follows[2]
image. Finally the stego image is divided into
Case
blocks of same size as in preprocessing phase and
1:
(
Case
)
(
⌈ ⌉
⌊ ⌋)
degrees as first phase but in opposite direction so
2:
that the stego image is similar to that of cover
(
Case
)
(
⌊ ⌋
⌈ ⌉)
image with secret data.
B. Data extraction:
3:
(
each of that block is shifted by an angle of same
)
(
⌊ ⌋
⌈ ⌉)
The stego image is divided into blocks and
each block is shifted by an angle of some degrees
Case
4:
(
Case
(
⌈ ⌉
⌊ ⌋)
5:
(
Case
which is same as that of data embedding, again is
)
range table is considered to extract correct
)
(
⌈ ⌉
⌊ ⌋)
information. In OPVD extraction phase, the
difference value is calculated between center pixel
6:
(
split into 3*3 blocks called hiding units. The same
)
(
ISSN: 2231-5381
⌊ ⌋
⌈ ⌉)
and its neighboring pixels then that value is
http://www.ijettjournal.org
Page 116
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 3 – Aug 2014
represented as binary string. Finally the binary data
is converted to text to know the secret information.
III.
RESULTS AND DISCUSSIONS:
Original
OPVD
PVD
TPVD
image
image
image
image
Cover image: Baby.jpg
Three steganography techniques using
PVD, tri way PVD[4] and proposed method have
been implemented in MATLAB which are applied
to baby.jpg,scenery.jpg,Light.jpg images. Fig. 4
Cover image: Scenery.jpg
represents the text file chosen for hiding in cover
image. In the Fig.5 stego images were compared
with each other and with original cover image. In
Fig 6 the histograms of each image is compared.
Cover image: Light.jpg
Fig. 6.histogram analysis for PVD, TPVD and OPVD methods
Cover image: Baby.jpg
Quality
OPVD
PVD
Tri way
parameters
Fig. 4 121 KB data hiding in the cover image
OPVD
PVD
PSNR
45.17
48.91
46.11
Maximum
359344
251538
323406
capacity(bits)
Stego images
Original
PVD
Triway PVD
images
Cover image: Scenery.jpg
PSNR
59.2336
64.9457
60.5158
Maximum
989256
800248
912442
capacity(bits)
Cover image: Light.jpg
PSNR
58.847
62.807
59.5247
Maximum
926224
884232
850324
capacity(bits)
Table. 1. Quality parameters analysis
Stego quality analysis and comparison have been
done by observing Table 1. From PSNR and
Maximum capacity observations it is clear that
capacity is maximum for OPVD method compared
Fig.5 Stego images obtained by PVD, TPVD and proposed
method OPVD
to PVD and TPVD and is also sustains the image
quality.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 117
International Journal of Engineering Trends and Technology (IJETT) – Volume 14 Number 3 – Aug 2014
IV.
CONCLUSION
BIOGRAPHY
In this paper a new steganography method OPVD
along with PVD and Tri way PVD method was
proposed,
implemented
and
analyzed.
The
proposed method hides data by dividing image into
hiding units and in each hiding unit the difference
is calculated with neighboring pixels by the center
pixel to hide the data. Quality measures were done
using PSNR and maximum capacity. From the
table and fig. we conclude that the perceptual
Ms. V.Navya, P.G Student,
Dept of ECE, SreeVidyanikethan Engineering
College, A. Rangampet, Tirupati received B.Tech
in Electronics and Communication Engineering
from YITS, Tirupati Interesting Areas Digital
Signal Processing, Image Processing, Embedded
Systems, Digital Communications
quality is good with hiding of maximum data in
OPVD than PVD and tri way PVD.
REFERENCES
[1] J. K. Mandal and Debashis Das, “Colour Image
Steganography Based on Pixel Value Differencing in Spatial
Domain”, International Journal of Information Sciences and
Techniques (IJIST), Vol.2, No.4, July. 2012
[2] C. Balasubramanian , S. Selvakumar& S. Geetha “High
payload image steganography with reduced distortion using
octonary pixel pairing scheme” Springer Science+Business
Media New York 2013
[3] Chan C-K, Cheng LM (2004) Hiding data in images by
simple LSB substitution. Pattern Recogn 37(3):469–474, 4
Mr. T .Ravi Kumar Naidu
Assistant
Professor,
Dept
of
ECE,
SreeVidyanikethan Engineering College, A.
Rangampet, Tirupati received B.Tech in
Electronics and Communication Engineering from
SVPCET, Puttur and M.Tech received from HIET
affiliated to JNTUH, Hyderabad. Interesting Areas
Digital Signal Processing, Array Signal Processing,
Image Processing, Video Surveillance, Embedded
Systems, Digital Communications
[4] Chang K-C, Chang C-P,Huang PS, Tu T-M (2008) A novel
image
steganographic
method
using tri-way
pixel-value
differencing. J Multimedia 37(2):44, 6
[5] Zhang X, Wang S (2004) Vulnerability of pixel-value
differencing
steganography
to
histogram
analysis
and
modification for enhanced security. Pattern RecognitLett
25:331–339, 46
[6] Yang CH, Weng CY, Wang SJ, Sun HM (2008) Adaptive
data hiding in edge areas of images with spatial LSB domain
systems. IEEE Trans Inf Forensic Secure 3(3):488–497, 45
ISSN: 2231-5381
Mr. T V S Gowtham Prasad
Assistant
Professor,
Dept
of
ECE,
SreeVidyanikethan Engineering College, A.
Rangampet, Tirupati received B.Tech in
Electronics and Communication Engineering from
SVEC, A .Rangampet, Tirupati and M.Tech
received from S V University college of
Engineering, Tirupati. Pursuing Ph.D from JNTU,
Anantapur in the field of Image Processing as ECE
faculty. Interesting Areas are Digital Signal
Precessing, Array Signal Processing, Image
Processing, Video surveillance, Embedded
Systems, Digital Communications
http://www.ijettjournal.org
Page 118
Download