IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.322 -328

International Journal of Research in Information Technology (IJRIT) www.ijrit.com

ISSN 2001-5569

A Novel Technique for High Capacity Covert Communication with Optimized PSNR PSNR Pradeep K H1, Sujay S N2 2

1 M.Tech. 4th SEM, Department of Electronics and communication Engineering, AIT, Tumkur Associate Professor, Department of Electronics and communication Engineering, AIT, Tumkur

ABSTRACT In present technology, secure data is very essential. Because of unsanctioned user activities like hacking of secrete information, information is destroyed and it is difficult to detect by sanctioned person. Steganography is the art of passing information in manner that the very existence of the message is unknown. The purpose of Steganography is to maintain secret communication between two parties. The secret information can be concealed in content such as image, audio, or video. In this project, a novel image Steganography technique to hide multiple colour secrete image in a colour cover image using discrete wavelet transform (DWT). This approach provides a good and well organized method for hiding the information and sent to destination in safer manner. Results show that the proposed algorithm can largely overcome the problems raised by hacking, low contrast. And extensively improve the Peak Signal to Noise Ratio between cover image and stego image compared to other technique.

KEYWORDS: KEYWORDS: Steganography, discrete wavelet transforms (DWT), MSE, and PSNR.

1. INTRODUCTION Secure data is the one of the major problem in the present communication system. After the world war II , the demand for a secure and strong communication between the communicating parties has increased due to fear of hacking .cryptography is the method of hide a secrete data by scrambling it so that it is unreadable, however it does not make sure about security and the robustness as the hacker can easily guess the secrete message that passing from source to the destination.steagnography is the technique of hiding data or information within the cover media such that it does not draw the diligence of an unsanctioned persons. Before the wireless communication data security was found. Processing and transmission of multimedia content over insecure network gives several security problems .To provide security aspect to multimedia contents, one needs to protect communicated data from unsanctioned users. Multimedia content needs to be secured from different type of attacks, for example, interference, interposing, adaptation and fabrication. Cryptography and Steganography are the two paths that makes the communication secures. Cryptography and Steganography are familiar and largely used techniques that operate information in order to cipher or hide their endurance respectively. Cryptography is basically swarm of information for assures secrecy and/or authenticity of information. Cryptography make possible us to transmit information across insecure networks so that it cannot be determined by anyone expect the sanctioned recipient. Steganography is the art and science to hide information in a cover that can be text, audio, image, video etc. Steganography is varied from cryptography. The main aim of cryptography is to secure communication by varying the data into a form so that the unsanctioned person cannot understand. Steganography is an improved technique of cryptography in which the secret data is embedded into a cover media in the way that only cover media is visible which is sent from transmitter to receiver without destroying. The consolidation of cryptography and Steganography gives high level security to the hidden data. Cover image known as carrier image, is the original image in which the secret information i.e. the secrete is embedded. The cover object could be an audio file, video file or an image file and the message to be hidden called the Payload could be a plain text, audio, video or an image. The cover object with the hidden information is called as the stegoobject. The secure image Steganography presents a challenging job of transferring the embedded data to the destination Pradeep K H, IJRIT-322

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.322 -328

without identified, not just by the limited powers of the HVS but also from powerful machine visions of pc’s. Hence Steganography technique must embed data into the carrier media without causing damage to the cover object. In this project, a novel image Steganography technique based on discrete wavelet transform has been proposed. Steganography is the one of the method used for the invisible communication. The intention of Steganography is to care of secrete communication between the two parties. The cache information can be concealed in content such as images, audio and video. This paper proposes a novel Image Steganography technique to cancel a multiple colour secrete images in colour cover image in discrete wavelet transform. This approach provides good results in the peak single to noise ratio compared to other technique and it is the simple’s technique.

1.1 DWT of an Image: To obtain the Discrete Wavelet Transform of the carrier media i.e. Cover image, a filter couple called the Analysis Filter pair is used. The low pass filter is functional to each row of statistics in order to obtain the low frequency components of the row. Since the Low Pass Filter is a half band filter, the output information needs to be sub-sampled by two, so that the output data now consists of only half of the original number of samples. Next, the high pass filter is introduced for the same row of data, and in the same way the high pass components are alienated, and placed by the side of the low pass components. This method is made for all rows. Once more filtering is through for each column of the in-between data. The consequential two dimensional arrays of coefficients contains four bands of data, each labeled as Low-Low, High-Low, Low High and HighHigh i.e. LL, HL, LH AND HH respectively. The Low-Low band can be divided once again in the same as earlier, thereby producing even additional sub-bands. The process can be done up to any level that will consequence in a pyramidal decomposition, sub band coding and example image as shown below in figure 3.5.2.1, 3.5.2.2 and 3.5.2.3 respectively.

Fig 1.1.1 Pyramidal Decomposition of

Image

Fig. 1.1.2 Decomposition of original data using Sub band coding under DWT

Fig. 1.1.3 Example Image Decomposed under DWT Domain Pradeep K H, IJRIT-323

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.322 -328

2. RELATED WORK Narendra K Pareek [1] has proposed a novel image encryption proposal using a secret key of 144-bits is projected. In the substitution process of the system, image is divided into blocks and consequently into color components. Each color component is customized by the stage bitwise operation which depends on secret key in addition to a few most significant bits of its earlier and subsequent color component. To make nonentity more robust, a feedback mechanism is also introduced by changing used secret key after encrypting each block. Further, resultant image is divided into many key based energetic sub-images. Each sub-image passes through the scrambling method where pixels of sub-image are mixed within itself by using a generated magic square matrix. Five rounds are taken for scrambling technique. This proposed scheme is uncomplicated, fast and receptive to the secret key. Because of high order of swap and permutation. H S Manjunatha Reddy and K B Raja [2] have proposed the cover image and Payload 1 intensity values are experiential and the intensity ethics above or equal to 128 are use for BPS embedding to produce BPS stego object. The intensity ethics of payload 1 and cover image are less than 128 are measured and apply square root on each pixel value of payload 1 to convert 8 bits length to 4 bits. The 4 bits of cover image are changed by 4bits of payload 1 to produce Least Significant Bit stego object. The transitional stego object is obtained by combining both BPS and Least Significant Bit stego object. The Integer Wavelet Transform is applied on middle stego object. The spatial domain payload 2 is embedded into LL sub band of transitional stego object to obtain a final stego object. The inverse Integer Wavelet Transform is functional on final stego object to develop stego image in spatial domain. The payload is extracted at the reciver end by applying inverse process of embedding. Elham Ghasemi et, al., [3] presents the function of Wavelet Transform and hereditary Algorithm in a original Steganography system.. The optimal pixel alteration process is applied after embedding the information. operation of the frequency domain to improve the robustness of Steganography and implement Genetic Algorithm and Optimal Pixel Adjustment Process to get an optimal mapping role to decrease the difference error between the cover and the stego-image, therefore to increasing the hiding capability with less distortions. Shahana.T [4] has proposed a technique to give high level security Steganography and cryptography are mixed. This arrangement encrypts secret data before embedding in to the image. Steganography uses RSA algorithm for encryption and decryption. According to the result of the stimulation, the stego images proposed method are equally identical to the cover images and it is too difficult to compare between those results. Better Peak Signal to Noise Ratio values will get when differentiate with Least Significant Bit Steganography with Huffman coding method K. K. Shukla and A. K. Tiwari [5] have proposed the filter bank configuration of Discrete Wavelet Transform is identified in this paper. The comparison for PR is described. Computational difficulty for DWT presented by error analysis system. The other structure Discrete Wavelet Transform of in terms of parallel filters is also explained. Impulse response and frequency response plots of obtained parallel filter formation validate its appropriateness in terms of dynamic frequency. Harsh Kumar Verma and Ravindra Kumar Singh [6] have described analysis of RC5, Blowfish and DES Block Cipher Algorithms. In this paper, they trying tell about the Performance analysis of RC5, Blowfish and DES block cipher. Control Process Unit usage and memory usage both are considered for finding resource usage. These thre3 algorithms are parameterized algorithm and encrypt two w-bits at a time. Blowfish and DES have same structure for encryption and decryption while RC5have differ in the values. RC5 has 12 and Blowfish & DES have 16 terms. These three algorithms have a different block size and a variable key size in their construction. Oprtsion of RC5 & Blowfish algorithm.

3. PROPOSED METHOD An image Steganography arrangement consists of two units: the embedding unit and the retrieval unit. The embedding unit is used at the source where the secrete data is embedded into the cover image toward gain stego-image using DWT Steganographic techniques. Whereas the retrieval unit is used at the destination to extract the secrete data from the stegoimage by using inverseDWT Steganographic technique as shown in the Figure 1.1.

Pradeep K H, IJRIT-324

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.322 -328

FIGURE 3.1: Block diagram of STEGANOGRAPHY Model

At the transmitter end, cover image and the payload are applied to the stego-system encoder to generate stego image using certain Steganography techniques. At the receiver end stego system decoder extracts the payload by identifying the key which may be used between the transmitter and the receiver to provide security against intelligent attackers.

3.1. Encoding model:

Fig 3.1.1 Proposed encoding model

Pradeep K H, IJRIT-325

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.322 -328

3.2. Decoding model:

Fig 3.1.2 Proposed decoding model

3.3 ALGORITHM Encoding process: 1. Read the Secrete input image to be hidden i.e. img1 2. Take discrete wavelet transform through HAAR wavelet for img1 it divides into four sub images and call the components as: cA, cH, CV, cD respectively. 3. Make redundant values in the img1 as zero. 4. Find the maximum value of each of the components and dividing each sub images by its maximum values that is normalizing each sub image. 5. The data having normalized decomposed values of img1 is saved as DEC. 6. Applying Discrete Wavelet Transform to the cover image im, it decomposes into four subbands called cA1, cV1, cH1, cD1 components by means of HAAR wavelet. 7. Store the cA size, M1, M2, M3, M4 in subbands of cover image that is cH1. 8. Store normalized img1 data DEC in cV1 and cD1 of cover image respectively. 9. Take Inverse Discrete Wavelet Transform of DEC1 which Means idwt of cover image (cA1, cH1, cV1, cD1) and call it as S. 10. Normalize the image S while saving, because there maybe chance of loss during conversion. 11. Convert image S into 16 bit format with the value M Where M=maximum (absolute(S)). 12. Calculate MSE and calculate Peak Signal TO Noise Ratio Using PSNR=10LOG10 (2552/MSE).

Decoding process: 1. Read the output stego image. 2. Extract the normalization size m from first pixel. 3. To overcome the losses that occur, place the first pixel value as second pixel. 4. Convert S1 from unit16 scale to original scale. Pradeep K H, IJRIT-326

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.322 -328

5. Apply Discrete wavelet transform that is haar wavelet of variable S1 and call the sub band as cA1,cV1,cH1,cD1 respectively. 6. Extract the hidden data from cH1. 7. Denormalized the values. 8. Extract DEC from combined data of cD1 and cV1. 9. Denormalized the DEC. 10. Take Inverse Discrete Wavelet Transform of set cA, cD, CV, cH respectively and call it as rec. 11. Recovered secret images are obtained

4. EXPERIMENTAL RESULTS The experimental results of the different images are as shown in the below figure. In this both cover image and secrete images are in colour, the psnr value of the stego image is as shown in the below table and it compares with other technique. This proposed technique gives the better psnr value compare to other existing technique as shown in the below table. PSNR=10LOG10 (2552/MSE) Where mse1= abs (uint8 (stego image)-uint8 (hidden image)) MSE=mean (mean (mse1.*mse1))

Cover image Payload image 1 white house jelly fish

Cover image thread mill.jpg

Payload image 1 earth.jpg

Payload image penguin

Payload image 2 moon.jpg

Cover image Payload image 1 Payload image 2 Fort.jpg earth. jpg football.jpg

TECHNIQUE

PSNR

Mandal,J.K.et.al.

39.6

Ghoshal N.et.al.

33.2

Kapre bhagyashri.et.al PROPOSED

36.6 43.18

Table 4.1 Comparison of PSNR (in dB) of the stego image in different methods

5. CONCLUSION Steganography is data hiding technique to prevent the detection of existence of covert information. The secret message in the form of images, videos, audio files, text documents and other digital files can be hidden inside images or any other digital objects. The purpose of Steganography is not to keep others from knowing the information - it is to keep Pradeep K H, IJRIT-327

IJRIT International Journal of Research in Information Technology, Volume 3, Issue 5, May 2015, Pg.322 -328

others away from thinking that the information even exists. In our project, we propose a unique technique for hiding 2 payload color images in a single color cover image and the two payload images can be regenerated without actually storing the image. It is done by employing HAAR Transform where both the cover image and the payloads are transformed using DWT and the normalized components of payload are embedded into the vertical and diagonal bands of the cover image. The proposed system has got excellent PSNR with high capacity, when compared with existing works. It is observed that the PSNR varies with the not only with the embedding technique but also on the type of images such as textured images. The highest PSNR obtained was 43.18 which is considered to be better one compared to the existing techniques.

References: [1] Narendra K Pareek.” Design and Analysis of A Novel Digital Image Encryption Scheme’, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, March 2012. [2] H S Manjunatha Reddy, K B Raja,” Hybrid Domain based Steganography using BPS, LSB and IWT”, International Journal of Computer Applications (0975 – 8887) Volume 54– No.3, September 2012.

[3] Elham Ghasemi, Jamshid Shanbehzadeh, Nima Fassihi,” High Capacity Image Steganography using Wavelet Transform and Genetic Algorithm”, Proceedings of International Multiconferenceof Engineers and Computer Scientists 2011, vol I. [4] Shahana T,” A Secure DCT Image Steganography based on Public-Key Cryptography”, International Journal of Computer Trends and Technology (IJCTT) – volume 4 Issue 7–July 2013 ISSN: 2231. [5] K. K. Shukla and A. K. Tiwari, “Efficient Algorithms for Discrete Wavelet Transform”, Springer Briefs in Computer Science, DOI: 10.1007/978-1-4471-4941-5_2,_ K. K. Shukla 2013. [6] Harsh Kumar Verma, Ravindra Kumar Singh,” Performance Analysis of RC5, Blowfish and DES Block Cipher Algorithms”, International Journal of Computer Applications (0975 – 8887) Volume 42– No.16, March 2012.

Pradeep K H, IJRIT-328

A Novel Technique A Novel Technique for High ...

data or information within the cover media such that it does not draw the diligence of an unsanctioned persons. Before the wireless communication data security was found. Processing and transmission of multimedia content over insecure network gives several security problems .To provide security aspect to multimedia ...

241KB Sizes 3 Downloads 367 Views

Recommend Documents

A Novel Technique for Frequency Stabilising Laser Diodes
The method described in this paper is more robust and easier to set up. ..... When we call the centre frequency of the atomic transition νt and the laser frequency ...

A Novel Feedback Reduction Technique for Cellular ...
To the best of our knowledge, CDF-FR ..... throughput optimization,” in Proc. ... [4] D. Park, H. Seo, H. Kwon, and B. G. Lee, “Wireless packet scheduling based on ...

A Novel Technique for Frequency Stabilising Laser Diodes
Since the output beam of a free running laser diode is diverging (elliptically ..... Feedback electronics. Setup for DAVLL. (c) JMWK '98. Monitor. Laser Diode ..... dard digital voltmeter which has a bandwidth of ≈1kHz, an AC noise voltage of.

A Novel Efficient Technique for Traffic Grooming in ...
backbone networks. Two kinds of equipment are used at a node in WDM. SONET networks: Optical Add-Drop Multiplexer (OADM) and electronic Add-Drop ...

A Novel Technique to Control Congestion in MANET using ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue .... Tech degree in from DAV, Jalandhar and completed B-Tech in 2005 with ...

A Novel Technique of Fingerprint Identification Based ...
Department, MPSTME, NMIMS University, Mumbai India. I. Fig. 1. Different .... ternational Conference on Computer Networks and Security. (ICCNS08) held at ...

A Novel Technique of Fingerprint Identification Based ...
Dr. H. B. Kekre is with Department of Computer Science, MPSTME,. NMIMS University ..... Int. Journal of Computer Science and Information Technology (IJC-. SIT) Vol. 01, No. ... M.E.(Computer Engineering) degree from. Mumbai University in ...

A Novel Technique to Control Congestion in MANET using ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 1, Issue 7, ... topology. 2. Congestion Control in MANET. To maintain and allocate network .... Tech degree in from DAV, Jalandhar and completed B-Tech in 2005 with honours fro

A Novel Efficient Technique for Traffic Grooming in WDM SONET with ...
We follow the following notations ... traffic add/drop sites around the ring. .... then pick the best solution among them. .... been examined and the best solution is found. IV. .... The tech- nique reformulates the problem as a non-linear problem an

A Novel Efficient Technique for Traffic Grooming in WDM SONET with ...
SONET rings and selecting the proper line speed for each wavelength so ... [1] [2] to support multiple line speeds. ..... on Local Computer Networks, Nov. 2000.

To propose a novel technique to reduce link failure ...
The physical connection between networked computing devices is established using either cable media or wireless media. Internet is the best-known computer ...

Performance Evaluation of OFDM Technique for High ...
PRS. Phase reference symbol for DAB. PBCC. Packet Binary Convolutional Coding. PHY. Physical Layer. QAM. Quadrature Amplitude Modulation. QoS.

a technique for canceling impulse noise in images ...
Also, there are vigorous efforts in exploring the application of CS in many different fields such as data mining, DNA microarrays, astronomy, tomography, digital.

A CT Scan Technique for Quantitative Volumetric ...
May 26, 2006 - Reconstructive Surgery at the Medical College of Wisconsin, and the ... computer for analysis with image-processing software to determine the ...

A Model-free Redundancy Resolution Technique for ...
relationship between robot end-effector position and joint angle vector. Many of the .... It is to be noted that the training data for simulation is generated using ...

A technique for the morphological characterization of ...
Application of traditional geomorphometric techniques is hindered by the spatial variability in ... and the automated extraction of submarine drainage systems. [Pratson ..... elevation data set to generate a raster file representing the theoretical .

A Variational Technique for Time Consistent Tracking of Curves ... - Irisa
divergence maps depending on the kind of targeted applica- tions. The efficiency of the approach is demonstrated on two types of image sequences showing ...

A Model-free Redundancy Resolution Technique for ...
words, different sets of joint angles may lead to same end- effector position thus ..... IEEE Journal of Robotics and Automation, RA-3(4):323–344, August. 1987.

A Circuit Representation Technique for Automated Circuit Design
automated design, analog circuit synthesis, genetic algorithms, circuit .... engineering workstations (1996 Sun Ultra), we present evolved circuit solutions to four.