TABLE OF CONTENT CHAPTER TITLE PAGE

advertisement
vii
TABLE OF CONTENT
CHAPTER
1
TITLE
PAGE
DECLARATION
ii
DEDICATION
iii
ACKNOWLEDGMENT
iv
ABSTRACT
v
ABSTRAK
vi
TABLE OF CONTENTS
vii
LIST OF TABLES
xi
LIST OF FIGURES
xiii
LIST OF ABBREVIATIONS
xvi
INTRODUCTION
1.1
Introduction
1
1.2
Background of the Problem
3
1.2.1
Low Payload Capacity
3
1.2.2
Imperceptibility problems
4
1.2.3
Robustness Problem
4
1.3
Statement of the Problem
5
1.4
Research Aim
6
1.5
Objectives of Research
6
1.6
Research Scope
7
1.7
Significance of the Research
11
viii
2
LITERATURE REVIEW
2.1
Introduction
9
2.2
Historical Overview
10
2.3
Cryptography
11
2.4
Cryptography Vs Steganography
12
2.5
Combination of Crypto-Steganography
13
2.6
Steganography protocols
14
2.7
Digital Watermarking
15
2.7.1
2.8
Steganography and Digital
Watermarking
16
Types of steganography
2.8.1
Text Steganography
18
2.8.2
Image Steganography
19
2.8.3
Audio Steganography
20
2.8.4
Video Steganography
20
2.8.5
Protocol Steganography
21
2.9
Steganography terminology
21
2.10
Steganography properties
22
2.10.1
Imperceptibility
22
2.10.2
Robustness
23
2.10.3
Payload Capacity
24
2.11
Techniques of Steganography
24
2.11.1
Least Significant Bit (LSB)
26
2.11.2
LSB and Palette Based Images
28
2.11.3
Enhanced LSB Algorithms
29
2.11.3.1
SLSB Algorithm
29
2.11.3.2
The PVD Method
31
2.11.3.3
Applying
randomization
concepts to LSB
2.12
PSNR formula
31
35
2.13
Attacks on Steganography
36
2.14
Visual Attacks
37
ix
2.14.1
2.14.2
3
4
38
Chi-square Attack
38
RESEARCH METHODOLOGY
3.1
Introduction
43
3.2
Dataset
44
3.3
Methodology
45
3.4
Data preparation
46
3.4.1
Cover Image Fibonacci Representation
47
3.4.2
Statistical Properties for Cover Image
49
3.4.3
Zeckendorf’s theorem
53
3.4.4
Pixels Decomposition using Fibonacci
54
3.4.5
Secret message preparation
57
3.5
Embedding Process
65
3.6
Imperceptibility Evaluation
69
3.7
Chi-square (χ2) Attack Implementation
69
3.8
Extraction Process
71
RESULTS AND DISCUSSION
4.1
Introduction
73
4.2
Implementation Results
74
4.2.1
Imperceptibility
74
4.2.1.1
75
4.3
5
Statistical analysis of pairs of
values
(histogram analysis)
PSNR Results
4.2.2
Visual Attack
81
4.2.3
Robustness Evaluation
85
Summary
88
CONCLOSIONS
5.1
Introduction
89
5.2
Work summary
90
5.3
Research Contribution
90
5.4
Future Works
91
x
REFERENCES
93
xi
LIST OF TABLES
TABLE NO.
TITLE
PAGE
2.1
Comparison between Steganography and Cryptography
12
2.2
Comparison between steganography and digital
watermarking.
17
2.3
LSB Insertion for Colored Image Pixel
30
2.4
The values of colored image pixel in SLSB Insertion
method
30
Summary of Steganography techniques applied by different
authors.
33
The values of Binary and Fibonacci system for some of n
values
40
The maximum number of changing in pixel value after
embedding
40
3.1
Impact of each Fibonacci bitplane into whole image
47
3.2
Impact of each Binary bitplane into the whole image
48
3.3
Comparisons between 0’s and 1’s pixels value in bitplane
(1) for binary representation
49
Fibonacci decomposition comparisons between 0’s and 1’s
pixels value in bitplane (1)
50
Binary decomposition comparisons between 0’s and 1’s
pixels value in bitplane (2)
51
Fibonacci decomposition comparisons between 0’s and 1’s
pixels value in bitplane (2)
52
The decimal and binary representation for lower case letter
and whitespace
56
modified decimal and binary representation for lower case
letters
60
2.5
2.6
2.7
3.4
3.5
3.6
3.7
3.8
xii
4.1
4.2
4.3
4.4
4.5
4.6
The
The
The
The PSNR of Lena 512x512 pixel cover image after
embedding variable size payloads
76
The PSNR of Peppers 512x512 pixel cover image after
embedding variable size payloads
76
The PSNR of Camerman 512x512 pixel cover image after
embedding variable size payloads
77
PSNR of Baboon 512x512 pixel cover image after
embedding variable size payloads
77
PSNR of Lake 512x512 pixel cover image after
embedding variable size payloads
78
PSNR of Pirate 512x512 pixel cover image after
embedding variable size payloads
78
xiii
LIST OF FIGURES
FIGURE NO.
TITLE
PAGE
2.1
Cryptography steganography combination
13
2.2
Steganography category
18
2.3
General steganography system
22
2.4
Categories of image Steganography
25
2.5
Model of steganography and steganalysis
37
2.6
Shows the Binary Representation for 256
Grayscale image
41
Shows the Fibonacci Representation for 256 ]
Grayscale image
41
Grayscale images, (a) Peppers, (b) Baboon,
(c) Lena, (d) Cameraman, (e) Lake, (f) Pirate
44
3.2
Operational Framework
45
3.3
Lena image with Fibonacci decomposition
(12-Bitplane)
47
Lena image with Binary decomposition
(8-Bitplane)
48
The probability of changing and not changing
due to embedding process into bitplane(1)
58
The probability of changing and not changing
due to embedding process into bitplane(2)
59
The probability of changing and not changing
due to embedding process into bitplane(1)
62
2.7
3.1
3.4
3.5
3.6
3.7
xiv
FIGURE NO.
3.8
TITLE
The probability of changing and not changing
due to embedding process into bitplane(2)
PAGE
63
3.9
Chosen of pixels (P1,P2,…,P8) to hide secret inside
it
65
3.10
Fibonacci LSB Embedding process
66
4.1
Grayscale images, (a) Peppers, (b) Baboon,
(c) Lena,(d) Cameraman, (e) Lake, (f) Pirate
75
PSNR(db) Vs Payload(Bytes) for simple LSB,
Fibonacci and the proposed method
79
Imperceptibility after embedding of (65536 bytes)
using (a) Original imag (b) Simple LSB
(c) Fibonacci LSB (d)Proposed method.
80
Representation of Layer(1) for all of ( (a) original,
(b) binary embedding stego-image, (c) Fibonacci
LSB stego-image and (d) proposed method
stego-image) for Lena Stego-image with
embedding of 65536 bytes embedding variable
size payloads
81
Representation of Layer(2) for all of ( (a) original,
(b) binary embedding embedding sego-image,
(c) Fibonacci LSB stego-image and (d) proposed
method stego -image) for Lena Stego-image with
embedding of 65536 bytes
82
Representation of Layer(3) for all of ( (a) original,
(b) binary embedding sego-image, (c) Fibonacci
LSB stego-image and (d) proposed method
stego-image) for Lena Stego-image with
embedding of 65536 bytes.
83
4.7
Chi-square attack on original Lena image.
84
4.8
Chi-square attack on lena stego-image after imbedding of
16384 bytes by using of simple LSB method.
85
Chi-square attack on lena stego-image after
imbedding of 16384 bytes by using of Fibonacci
LSB method.
86
4.2
4.3
4.4
4.5
4.6
4.9
4.10
Chi-square attack on lena stego-image after
xv
FIGURE NO.
TITLE
embedding of
16384 bytes using of proposed method
PAGE
86
xvi
LIST OF ABBREVATIONS
LSB
Least significant Bit
HVS
Human Visual System
PVD
Pixel Value Differencing method
MBNS
Multiple-Base Notational System
DCT
Discrete Cosine Transform
XML
Extensible Markup Language
JPEG
Joint Photographic Expert Group
GIF
Graphic Interchange Format
Bmp
Bitmap image format
OSI
Open Systems Interconnection
TCP/IP
Internet protocol suite TCP/IP
HAD
Human Audio System
PSNR
peak signal to noise ratio
MSE
Mean Square Error
SLSB
Selected Least Significant Bit
PVD
Pixel-Value Differencing
PRNG
Pseudo-Random Number Generator
RGB
Red Green Blue
Download