A Novel Approach of Multilevel Binary Image Encoding using Walsh

advertisement
International Journal of Engineering Trends and Technology- Volume2Issue3- 2011
A Novel Approach of Multilevel Binary Image
Encoding using Walsh Table and Spiral Scanning
Nilanjan Dey#1, Sourav Samanta#2, Anamitra Bardhan Roy#3
#1
IT Department, JIS College of Engineering, Kalyani, Nadia-741235, West Bengal, INDIA
CSE Department, JIS College of Engineering, Kalyani, Nadia-741235, West Bengal, INDIA
#3
CSE Department, JIS College of Engineering, Kalyani, Nadia-741235, West Bengal, INDIA
#2
Abstract— In this paper we proposed a method of image
encoding technique in a new formulated way. During
transmission image is encoded in two phases for the
enhancement of security. In the first phase encoding is done
using Walsh table and in the second phase by using spiral
scanning based encoding technique.
Keywords— Image Encoding, Dual-Encoding, Walsh table, Spiral
Encoding.
I.
INTRODUCTION
Image encoding enhanced the security remarkably.
Embedding encoded messages or images in stenographic
system can be carried out with many different technique
namely LSB, DCT, DWT, etc.
Steganography [1, 2, 3] is the process of hiding of a secret
message within an ordinary message and extracting it at its
destination. Anyone else viewing the message will fail to
know it contains secret/encrypted data. The word comes from
the Greek word “steganos” meaning “covered” and “graphei”
meaning “writing”.
Encoding of the secrete image can be perform in many
different ways like LAR Codec [4], XOR transformation [6],
G-Scan [5], etc.
To modify the technique of image encoding for betterment
we tried to propose a new methodology to encode an image
using Walsh table and spiral based scanning. This Dual-layer
Encoding technique is carried out for the purpose of two fold
security.
II.
As an example,
W1 = [+1]
W4 =
+1 +1
W2 = +1 -1
+1
-1
+1
-1
+1
+1
+1
+1
+1
-1
+1
-1
These sequences are Walsh codes and can be derived from
a binary Walsh matrix.
A station sends out its chip sequence to send a 1 and its
inverse to send a 0 (or +1 and a -1; zero being silence).
For our further computational we will use binary Walsh
Matrix.
III. SPIRAL SCANNING AND ENCODING
TECHNIQUE
Scan the elements of 2-D array using spiral fashion and
store the elements into a 1-D array.
1 2 3
4
6 7 8
9
11 12 13 14
16 17 18 19
21 22 23 24
WALSH TABLE
In Carrier Sense Multiple Access (CDMA) procedure one
of the efficient ways to generate orthogonal code sequences is
Walsh table [7]. Each row of a Walsh table is an orthogonal
code sequence.
The tables can be generated recursively, provided that K is
power of two.
W1 = [+1]
W2N = WN
WN
+1
+1
+1
+1
5
10
15
20
25
Figure 1
Scan the generated 1-D array and store elements in a 2-D
array to generate encoded array.
1
2
3
4
5
10
15
20
25
24
Figure 2
WN
WN
ISSN: 2231-5381 http://www.internationaljournalssrg.org
Page 12
International Journal of Engineering Trends and Technology- Volume2Issue3- 2011
1
10
23
6
19
2
15
22
7
18
3
20
21
8
17
4
25
16
9
12
5
24
11
14
13
First Phase Decoding:
7. Perform XOR operation between the elements of the
first phase decoded matrix and the Walsh matrix at
respective positions to get back the original secret
image.
Figure 3
Decoded array is generated by linearly scanning elements
from the above array and store the elements in spiral way into
a separate 2-D array.
1
2 3 4
6 7 8 9
11 12 13 14
16 17 18 19
21 22 23 24
5
10
15
20
25
V. RESULT AND DISCUSSION
The First and Second phase encoded and decoded image is
shown below,
Encoding by Appling Walsh Table:
Figure 4
IV. PROPOSED METHOD
First Phase Encoding:
1.
2.
3.
The size of the secret binary image is computed.
A Walsh table is generated considering -1 as 0 of
the same size as the binary image.
XOR operation is performed between the
elements of the image matrix and the Walsh
matrix at respective positions.
(a)
(b)
Encoding by Appling Spiral Scanning:
Second Phase Encoding:
1. The generated encoded image from the first phase
are scanned in the spiral way and store in a 1-D
array.
2. The array elements are scanned in linear fashion and
elements are stored in a 2-D array same as the
image size
3. The elements are scanned from the 2-D array
linearly and stored in a final array in the spiral way
to generate final encoded image.
(c)
(d)
Decoding by Appling Spiral Scanning:
Second Phase Decoding:
4. Final encoded image is scanned in the spiral way
and stored in a 1-D array.
5. The array elements are scanned in linear fashion
and elements are stored in a 2-D array same as
the image size
6. The elements are scanned from the 2-D array
linearly and stored in an array in the spiral way to
get back the first phase decoded image
(e)
ISSN: 2231-5381 http://www.internationaljournalssrg.org
(f)
Page 13
International Journal of Engineering Trends and Technology- Volume2Issue3- 2011
Decoding by Appling Walsh Table:
TABLE II
Correlation
(Original image vs. Recovered image)
1
Table II shows that Correlation between Original image
and recovered image is 1 stating that the proposed method is
lossless.
(g)
(h)
Figure 5.(a)Original Secret image (b)Walsh table Encoded image (c)Walsh
table Encoded image (d) Encoded image by Spiral Scanning (e) Encoded
image by Spiral Scanning(f) Decoded image by Spiral Scanning(g) Decoded
image by Spiral Scanning(h) Recovered image
VI. CONCLUSION
In the proposed method the image is encoded twice which
can be embedded in a cover image for the purpose of image
hiding. Proposed approach is more secured than any single
level encoding technique and reduces the security threat.
REFERENCES
1.
2.
(i)
(j)
Figure 6. (i)Histogram of Original image (j) Histogram of removed image.
3.
4.
Correlation coefficient:
The similarity of Original image A and encoded images B
was measured by the standard correlation coefficient as
follows:
Corr2 computes the correlation coefficient using
6.
∑ ∑ (Amn - A) (Bmn - B)
m
5.
7.
0N. F. Johnson and S. Katzenbeisser,” .A survey of
Steganographic techniques”, in S. Katzenbeisser and F. Peticolas
(Eds.): Information Hiding, pp.43-78. Artech House, Norwood,
MA, 2000.
Lou, D. C. and Liu, J. L. 2002. “Steganography Method for Secure
Communications”. Elsevier Science on Computers& Security, 21,
5: 449-460.
J. Fidrich and M. Goljan, .Practical steganalysis of digital imagesstate of the art., Proc. SPIE Photonics West, Vol. 4675, pp. 1-13,
San Jose, California, Jan. 2002.
Color LAR Codec: A Color Image Representation and
Compression Scheme Based on Local Resolution Adjustment and
Self-Extracting Region Representation : Circuits and Systems for
Video Technology, IEEE Transactions on Issue Date: Aug. 2007
Volume: 17 Issue:8
Ali Al-Ataby and Fawzi Al-Naima, “A Modified High Capacity
Image Steganography Technique Based on Wavelet Transform”,
The International Arab Journal of Information Technology, Vol. 7,
No. 4, October 2010
Formal methods in computer-aided design: first international
conference ... By MandayamSrivas, Albert Camilleri
http://en.wikipedia.org/wiki/Walsh_function
n
r=
∑ ∑ (Amn - A) 2 ∑ ∑(Bmn – B) 2
m
Where
n
m
= mean2 (A), and
n
= mean2 (B).
TABLE 1
Correlation
(Original
image Vs.
1st
level
Encoded
image)
1
Correlation
(Original
image Vs.
2nd
level
Encoded
image)
1
Correlation
(Original
image vs.
1st
level
Decoded
image)
1
Correlation
(Original
image Vs.
2nd
level
Decoded
image)
1
ISSN: 2231-5381 http://www.internationaljournalssrg.org
Page 14
Download