A Novel Session Based Dual Image Encoding and Hiding Technique Using DWT and Spread Spectrum

Similar documents
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques

Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment

CHAPTER 7 CONCLUSION AND FUTURE WORK

Image Authentication Scheme using Digital Signature and Digital Watermarking

ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security

Multi-factor Authentication in Banking Sector

Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation

Safer data transmission using Steganography

A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms

Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.

AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY

A Secure Data Transmission By Integrating Cryptography And Video Steganography

AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES

Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT

Introduction to Medical Image Compression Using Wavelet Transform

STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

A Digital Audio Watermark Embedding Algorithm

Security and protection of digital images by using watermarking methods

2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India

International Journal of Advanced Computer Technology (IJACT) ISSN: Least Significant Bit algorithm for image steganography

HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER

Sachin Patel HOD I.T Department PCST, Indore, India. Parth Bhatt I.T Department, PCST, Indore, India. Ankit Shah CSE Department, KITE, Jaipur, India

INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010

SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING

Redundant Wavelet Transform Based Image Super Resolution

IMAGE STEGANOGRAPHY FOR SECURE DATA TRANSMISSION USING BLOWFISH ALGORITHM

Image Compression through DCT and Huffman Coding Technique

Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan

Friendly Medical Image Sharing Scheme

PIXEL-LEVEL IMAGE FUSION USING BROVEY TRANSFORME AND WAVELET TRANSFORM

Security Based Data Transfer and Privacy Storage through Watermark Detection

Reversible Data Hiding for Security Applications

SPEECH SIGNAL CODING FOR VOIP APPLICATIONS USING WAVELET PACKET TRANSFORM A

Multimedia Document Authentication using On-line Signatures as Watermarks

Combating Anti-forensics of Jpeg Compression

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Soumendu Chakraborty, Anand Singh Jalal* and Charul Bhatnagar

Secret Communication through Web Pages Using Special Space Codes in HTML Files

A comprehensive survey on various ETC techniques for secure Data transmission

Study on Image Steganography Techniques

Data Masking: A New Approach for Steganography?

COMPRESSION OF 3D MEDICAL IMAGE USING EDGE PRESERVATION TECHNIQUE

A Concept of Digital Picture Envelope for Internet Communication

Steganography Detection for Digital Forensics

MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION

Sachin Dhawan Deptt. of ECE, UIET, Kurukshetra University, Kurukshetra, Haryana, India

CHAPTER 2 LITERATURE REVIEW

Steganography and Visual Cryptography in Computer Forensics

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

CHAPTER 1 INTRODUCTION

International ejournals

Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

WATERMARKING FOR IMAGE AUTHENTICATION

Region of Interest Access with Three-Dimensional SBHP Algorithm CIPR Technical Report TR

Estimating the Redundancy Factor for RA-encoded sequences and also Studying Steganalysis Performance of YASS

Image Information Hiding: An Survey

Turgut Ozal University. Computer Engineering Department. TR Ankara, Turkey

MEDICAL IMAGE COMPRESSION USING HYBRID CODER WITH FUZZY EDGE DETECTION

International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Vol. XXXIV-5/W10

On Covert Data Communication Channels Employing DNA Steganography with Application in Massive Data Storage

Voice---is analog in character and moves in the form of waves. 3-important wave-characteristics:

Adaptive Equalization of binary encoded signals Using LMS Algorithm

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography

CDMA TECHNOLOGY. Brief Working of CDMA

Separable & Secure Data Hiding & Image Encryption Using Hybrid Cryptography

Online Voting System Using Three Factor Authentication


International Journal of Emerging Technology and Advanced Engineering Website: (ISSN , Volume 2, Issue 9, September 2012)

Triple Security of Information Using Stegnography and Cryptography

SOFTWARE AND HARDWARE-IN-THE-LOOP MODELING OF AN AUDIO WATERMARKING ALGORITHM. Ismael Zárate Orozco, B.E. Thesis Prepared for the Degree of

Keywords Decryption, Encryption,password attack, Replay attack, steganography, Visual cryptography EXISTING SYSTEM OF KERBEROS

Hamid.A.Jalab, A.A Zaidan and B.B Zaidan

Using fractal compression scheme to embed a digital signature into an image

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

SOURCE SCANNER IDENTIFICATION FOR SCANNED DOCUMENTS. Nitin Khanna and Edward J. Delp

Revision of Lecture Eighteen

ScienceDirect. Brain Image Classification using Learning Machine Approach and Brain Structure Analysis

Real-Time Audio Watermarking Based on Characteristics of PCM in Digital Instrument

2K Processor AJ-HDP2000

AN OVERVIEW OF IMAGE STEGANOGRAPHY

A Feature Selection Methodology for Steganalysis

STUDY OF MUTUAL INFORMATION IN PERCEPTUAL CODING WITH APPLICATION FOR LOW BIT-RATE COMPRESSION

TCOM 370 NOTES 99-4 BANDWIDTH, FREQUENCY RESPONSE, AND CAPACITY OF COMMUNICATION LINKS

An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT

Transcription:

A Novel Session Based Dual Image Encoding and Hiding Technique Using DWT and Spread Spectrum Tanmay Bhattacharya Nilanjan Dey S. R. Bhadra Chaudhuri Asst. Professor Dept. of IT Asst. Professor Dept. of IT Professor, Dept of E&TCE JIS College of Engineering JIS College of Engineering Bengal Engineering and Science University Kalyani, West Bengal, India Kalyani, West Bengal, India Shibpur Howrah, West Bengal, India tb.jisce@gmail.com dey.nilanjan@ymail.com prof.srbc@gmail.com ABSTRACT This work proposes a DWT based Steganographic technique. Cover image is decomposed into four sub bands using DWT. Two Encoded secret images are embedded within the HL and HH sub bands respectively. During embedding secret images are dispersed within each band using a pseudo random sequence and a Session key. Encoded Secret images are extracted using the session key and the size of the images.decode to recover the secrete images. In this approach the stego image generated is of acceptable level of imperceptibility and distortion compared to the cover image and the overall security is high. Keywords Zigzag Encoding, DWT, Session Based Key, Pseudo Random Sequence I. INTRODUCTION Steganography [1, 2, 3] is the process of hiding of a secret message within an ordinary message and extracting it at its destination. Anyone else viewing the message will fail to know it contains secret/encrypted data. The word comes from the Greek word steganos meaning covered and graphei meaning writing. LSB [4] insertion is a very simple and common approach to embedding information in an image in special domain. The limitation of this approach is vulnerable to every slight image manipulation. Converting image from one format to another format and back could destroy information secret in LSBs. Stego-images can be easily detected by statistical analysis like histogram analysis. This technique involves replacing N least significant bit of each pixel of a container image with the data of a secret message. Stego-image gets destroyed as N increases. In frequency domain data can be secret by using Discrete Cosine Transformation (DCT) [5, 8]. Main limitation of this approach is blocking artefact. Grouping the pixel into 8x8 blocks and transforming the pixel blocks into 64 DCT co-efficient each. A modification of a single DCT co-efficient will affect all 64 image pixels in that block. One of the modern techniques of Steganography is Discrete Wavelet Transformation (DWT) approach [6, 7]. In this approach the imperceptibility and distortion of the Stego image is acceptable and it is resistant to several attacks. II. DISCRETE WAVELET TRANSFORMATION The wavelet transform describes a multi-resolution decomposition process in terms of expansion of an Image onto a set of wavelet basis function. The wavelet transform describes a multi-resolution decomposition process in terms of expansion of an Image onto a set of wavelet basis functions. Discrete Wavelet Transformation having its own excellent space frequency localization properly. Applying DWT in 2D images corresponds to 2D filter image processing in each dimension. The input image is divided into 4 non-overlapping multi-resolution ISSN : 0975-3397 Vol. 3 No. 11 November 2011 3510

sub-bands by the filters, namely (LL1), (LH1), (HL1) and (HH1). The sub-band (LL1) is processed further to obtain the next coarser scale of wavelet coefficients, until some final scale N is reached. When N is reached, we ll have 3N+1 sub-bands consisting of the multi-resolution sub-bands (LLN) and (LHX), (HLX) and (HHX) where X ranges from 1 until N. Generally most of the Image energy is stored in these sub-bands. Fig.1: Three phase decomposition using DWT. The Forward Discrete Wavelet Transform is very suitable to identify the areas in the cover image where a stegano image can be embedded effectively due to its excellent space-frequency localization properties. In particular, this property allows the exploitation of the masking effect of the human visual system such that if a DWT co-efficient is modified, it modifies only the region corresponding to that coefficient. The embedding secret image in the lower frequency sub-bands (LL X ) may degrade the image significantly, as generally most of the Image energy is stored in these sub-bands. Embedding in the low-frequency sub-bands, however, could increase robustness significantly. In contrast, the edges and textures of the image and the human eye are not generally sensitive to changes in the high frequency sub-bands (HH X ). This allows the stego-image to be embedded without being perceived by the human eye. The compromise adopted by many DWT based algorithms, to achieve acceptable performance of imperceptibility and robustness, is to embed the secret image in the middle frequency sub-bands (LH X ) or (HL X ) and (HH X ). The Haar wavelet is also the simplest possible wavelet. Haar wavelet is not continuous, and therefore not differentiable. This property can, however, be an advantage for the analysis of signals with sudden transitions. III. CODE DIVISION MULTIPLE ACCESS (CDMA) SPREAD-SPECTRUM TECHNIQUE Spread-spectrum technique can be described as a method in which a signal generated in a particular bandwidth when deliberately spread in the frequency domain, results in a signal with a wider bandwidth. If distortion is introduced in this signal by some process such as noise or filtering which damages only certain bands of frequencies, the message will be still in a recoverable state. In spread spectrum communications, the signal energy inserted into any one frequency is too undersized to create a visible artefact and the secret image is scattered over a wide range of frequencies, that it becomes robust against many common signal distortions. Because of its good correlation properties, noise like characteristics, easier to generate and resistance to interference, Pseudo noise sequences are used for Steganography. IV. ZIGZAG ENCODING Input image is encoded using zigzag encoding. Zigzag encoding is shown in Fig 2. Outputs of the encoding process are shown in Fig 3 and Fig 4. ISSN : 0975-3397 Vol. 3 No. 11 November 2011 3511

Fig.2: Zigzag Scanning Fig.3: Secret Image1 and Image1 (Encoded) Fig.4: Secret Image2 and Image2 (Encoded) V. PROPOSED ALGORITHM Secret Image Hiding: 1. Cover image is decomposed into four sub bands (LL, LH, HL and HH) using DWT. 2. Two secret images are encoded using zigzag scanning method and converted into two different 1D Vectors. 3. Two different pseudo random 2D sequences are generated by the session based key. 4. Each HL and HH sub band of the cover image are modified separately using corresponding PN sequence depending upon the content of the corresponding secret 1D image vector to be embedded. 5. Four sub bands including two modified sub bands are combined to generate the stego image using IDWT (Fig 5). ISSN : 0975-3397 Vol. 3 No. 11 November 2011 3512

Fig 5: Image Hiding Process Secret Image Extraction 1. Session key and Sizes of the secret images are sent to the intended receiver via a secret communication channel. 2. Secret images can recovered from the stego image using Correlation function and knowing the size of the secret image. 3. Extracted Secret Images are decoded by inverse zigzag scanning method then filtered to remove the unwanted signal (Fig 6). ISSN : 0975-3397 Vol. 3 No. 11 November 2011 3513

Fig 6: Image Extraction Process VI. EXPLANATION OF THE ALGORITHM Secret Image Hiding Using DWT the Cover image is decomposed into four sub bands (LL, LH, HL and HH). Two binary images, Secrete Image 1 and Secrete Image 2 are taken and encoded using zigzag encoding method and converted into 2 one dimensional vectors. Two pseudo random sequences are generated using a session based key and the size of any sub bands of the cover image. Each of the bits of the binary secret image1 and binary secret image2 are embedded in HL and HH sub-bands respectively depending upon the elements of the one dimensional vector and the pseudo random sequences. The general equation used to embed the secret image is: I S (x, y) = I (x, y) + k S (x, y) (1) In which I(x, y) representing the selected DWT sub band of the cover image, I S (x, y)) is the modified cover image, K denotes the amplification factor that is usually used to adjust the invisibility of the secrete images in corresponding sub bands. S (x, y) is the pseudo random sequences Taking all the sub bands including the modified HH and LH sub bands, stego image is obtained applying IDWT (Inverse Discrete Wavelet Transformation) Secret Image Extraction procedure The session key and the size of the secrete images are provided to the intended receiver through a secrete communication channel. Sub-bands are selected into which the secret image was embedded after applying DWT on stego image. Regenerate the pseudo random sequence (PN) using the same session based key which was used in the secret image embedding procedure. Calculate the correlation between the selected stego sub-band and the generated pseudo random sequence. Compare each correlation value with the mean correlation value. If the calculated value is greater than twice the mean, then the extracted watermark bit will be taken as a 0, otherwise it is taken ISSN : 0975-3397 Vol. 3 No. 11 November 2011 3514

as a 1. The recovery process then iterates through the entire PN sequence until all the bits of the encoded secret image1 and encoded secret image 2 have been recovered. These two images are decoded using inverse zigzag scanning. Filter is used on recovered secrete images to remove unwanted signals. VII. RESULTS Results of the proposed algorithm are shown below (Fig 7 to Fig10). Fig. 7: Cover Image Fig. 8: Image-1(Encoded) and Image-2(Encoded) Fig. 9: Stego Image Fig. 10: Recovered Secret Image1 and Image2 ISSN : 0975-3397 Vol. 3 No. 11 November 2011 3515

Peak Signal to Noise Ratio (PSNR) It measures the quality of a stego image. This is basically a performance metric and perceptual transparency of the stego image with respect to host image: use to determine Where, M and N are number of rows and columns in the input image, (1) is the original image and is the Stego Image. PSNR between Cover Image and Stego Image is 28.2633 shown in Table1. Cover Image PSNR vs. Stego Image 28.2633 Table 1 Correlation coefficient After secret image embedding process, the similarity of original cover image x and stego images x' was measured by the standard correlation coefficient as follows: (2) Where y and y' are the discrete wavelet transforms of x and x' Correlation between the secrete image1 and recovered secrete image1 after applying filter is 0. 9273and between the secrete image2 and recovered secrete image2 is0.8433 shown in Table 2 Correlation between Image1 Image 2 original secret image and recovered secret image 0.9273 0.8433 Table 2 VIII. CONCLUSION In the proposed method second image is embedded in the HL sub band of the cover image. So there is a small visual change in between cover image and stego image. But due strong security aspects this small amount of imperceptibility is acceptable. This approach can be applied for color image and audio steganography also because DWT is applicable for any digital signal. REFERENCES [1] N. F. Johnson and S. Katzenbeisser,.A survey of steganographic techniques, in S. Katzenbeisser and F. Peticolas (Eds.): Information Hiding, pp.43-78. Artech House, Norwood, MA, 2000. [2] Lou, D. C. and Liu, J. L. 2002. Steganography Method for Secure Communications. Elsevier Science on Computers& Security, 21, 5: 449-460. [3] J. Fridrich and M. Goljan,.Practical steganalysis of digital images-state of the art., Proc. SPIE Photonics West, Vol. 4675, pp. 1-13, San Jose, California, Jan. 2002. [4] Chan, C. K. and Cheng, L. M. 2003. Hiding data in image by simple LSB substitution. Pattern Recognition, 37:469-474. [5] Iwata, M., Miyake, K., and Shiozaki, A. 2004. Digital Steganography Utilizing Features of JPEG Images, IEICE Transfusion Fundamentals, E87-A, 4:929-936. ISSN : 0975-3397 Vol. 3 No. 11 November 2011 3516

[6] Po-Yueh Chen* and Hung-Ju Lin, A DWT Based Approach for Image Steganography, International Journal of Applied Science and Engineering 2006. 4, 3: 275-290 [7] Ali Al-Ataby and Fawzi Al-Naima, A Modified High Capacity Image Steganography Technique Based on Wavelet Transform, The International Arab Journal of Information Technology, Vol. 7, No. 4, October 2010 [8] Blossom Kaur, Amandeep Kaur, Jasdeep Singh, Steganographic Approach for Hiding Image in DCT Domain, International Journal of Advances in Engineering & Technology, July 2011. ISSN : 0975-3397 Vol. 3 No. 11 November 2011 3517