Sei sulla pagina 1di 5

2016 Symposium on Colossal Data Analysis and Networking (CDAN)

Advanced Hiding Technique for Rotated Text Message


in Digital Images

Aditi Soni, Sujeet Badodia


Computer Science Department
Shri Vaishnav Institute of Tech. & Sc.
Indore, India
aditisoni519@gmail.com

Abstract- Data hiding techniques have taken the very process and top-secret key provided by the sender. Generally
important role with the speedy growth of intensive transfer of this can be done by embedding the stealthy message within
multimedia matter and stealthy communications. Steganography another digital medium like text, image, audio or video. A
is the skill of hiding information in such a way that prevents model of the Steganography process is illustrated in Fig. 1.
recognition of the data. There are different kinds of carrier file
formats can be used, but digital images are the most popular
because of their existence on the Internet. In this paper, data Secret
hiding method is introduced that utilizes Rotation of the letters, Key
Message
JPEG compression and two new techniques. First, rotation of
letters is done by matrix rotation. Then JPEG compression takes
place, which includes two new techniques, i.e. Permutation
straddling and Matrix Encoding. Results came from the research Embedding Stego
show that the proposed method can hide a large amount of secret
Function Object
data and also keep very high security as PSNR is to be more than
35 dB, and there is a comparision between the old technique and
proposed technique.

KeywordsSteganography, Rotation, Compression, Security, Cover


Data Hiding, Angle, PSNR Secret Extraction
Object Message Function

I. INTRODUCTION
The plain need of every rising area in todays world is Key
communication. One and all want to keep the secret
information of work to be top-secret and safe. We use Fig. 1. Steganography System Scenario
numerous insecure pathways in our everyday life for
transmitting and sharing material using internet or any other JPEG Compression: - The goal of the most common style
medium, but at a certain level it's not safe. Steganography is of JPEG is to deliver the best possible quality at a given
one of the methods which can be used to transfer information compression ratio. Therefore the original records must be
in a concealed manner. carried into a suitable form allowing to distinguish between
Steganography: - The secret message is made to hide in significant (relevant) and less significant (irrelevant) matters.
digital image so that it couldnt be visible to any intermediate The JPEG standard insists on coding process carried out at
person. Intermediate person will not be able to detect whether multi-level:
there is any message concealed in the matter which is being 1) Image Preparation: - The image will be divided into
shared or not. The cover image containing the stealthy components, which are modified to the different
message is then transferred to the recipient. The receiver is quality requirements.
able to take out the message with the help of retrieving
978-1-5090-0669-4/16/$31.00 2016 IEEE
2016 Symposium on Colossal Data Analysis and Networking (CDAN)

2) Transformation: - Each specific component is A data hiding method which is established on interpolation
transferred into a format that allows making and LSB substitution. In this proposed method, first
conclusions about the arrangement of the contents. interpolation method are used to balance up and down the
This proposals the option to make a distinction cover image before hiding stealthy data for the wish of higher
between basic and more complex contents. capacity and quality. After that, the LSB substitution method
3) Quantization: - The transformed matter is weighted is used to implant stealthy data. The supreme common
according to their sense for the image matters. techniques for burying the data are Least Significant Bit
4) Entropy: - Removal of redundant information. (LSB) substitution and pixel-value differencing (PVD). LSB
substitution swaps the least significant bit with a top-secret bit
II. RELATED WORK stream. LSB similar is either added or subtracted haphazardly
from the pixel value of the cover data when the embedding bit
Ki-Hyun Jung [2014] projected the data hiding method does not match. Also, LSB technique is not resistant to visual
which is established on interpolation and LSB substitution. attacks. Changes reside crowded at the start of the file.
The interpolation method has been introduced before burying Therefore, a part of the le remains unused. Attacks profit
secret data for the purpose of advanced capacity and best from the high change density. This is called continuous
quality. After that, the LSB substitution method was embedding.
introduced for implanting the secret data.
IV. PROPOSED APPROACH
Mehdi Hussein [2013] provided an overview of different
Steganography techniques, its main types and classification of A data hiding method that is the combination of Rotation of
Steganography which have been planned in the literature the letters, then JPEG compression which includes two new
through last few years. We have seriously analyzed different technique is introduced, permutation straddling and Matrix
proposed techniques using LSB based methods, which show Encoding. The part of rotation is done by rotating the letters of
that pictorial and visual quality of the image is tumble down the word, one by one by 85. Then JPEG compression takes
when size of hidden data increased up to certain limit. And place which is of four main steps:
many of them implanting techniques can be wrecked or shows
sign of modification of image by cautious analysis of the 1) Image Preparation
properties of noise. 2) Transformation
3) Quantization
Atallah M [2012] suggests a new Steganography technique 4) Entropy Coding
which was presented, also implemented and analyzed. In
planned method, identical bits between the stealthy messages But there is a pause after the Quantization process in which
and image pixels values are searched, on the basis of which, two processes takes place. We know that, a buried message
data should be hidden. The planned method was compared does not require the full Space. Thats why, a portion of the
with the LSB method for hiding the stealthy message which le remain as unused. Fig. 2 shows, that the changes
bury the stealthy message straight in the least two significant concentrates on the starting portion of the le, and the
bits of the image pixels. remaining portion exist on the end. This is called continuous
embedding. These are the invitations to the intruder for visual
Mamta Juneja [2014] projected the technique which attacks. To prevent these attacks, the implanting function
achieves the aim of an implementation of new steganography should use the carrier medium as usual as possible. The
method for images which is the mixture of three new density of embedding the data should be the equal
techniques It attains the target of 50% hiding capacity and everywhere.
Noiselessness (PSNR value) with minimum MSE.
So first we apply Permutative Straddling. In this, message will
Our literature review finds that significant work has been done be widen out over the whole carrier medium. The straddling
on the state of Steganography which is using the LSB tool shues whole coecients using permutation. Then,
technique. Various good hard work have also been made by implants it into the permuted order. The contraction which
using PSNR values and mean square errors (MSE). However, takes place here does not change the number of coecients. It
visual attacks still be possible in the LSB techniques. This only changes the value of coefficients. The permutation based
problem of visual attacks needs to be addressed through a very on a key derived from a password. It delivers the coecients
responsive solution. which is changed steganographically, in its original
arrangement to the Human coder. With the use of correct
III. PROBLEM DEFINITION key, the receiver is able to repeat the permutation. Fig. 3
2016 Symposium on Colossal Data Analysis and Networking (CDAN)

shows the constantly distributed changes over the whole


image.
Cover Image

1. Rotation

2. JPEG Compression
Fig. 2. Continuous embedding concentrates changes
A) Image Preparation

B) Transformation
Message
C) Quantization

2.1 Permutation
Fig. 3. Permutative embedding scatters the changes Straddling

After that, Matrix Encoding takes place. Determine the k from


the measurements of the carrier medium, and the length of the 2.2 Matrix Encoding Channel
secret message. Then calculate the code word length n =2k 1.
And then embed the secret message with (1, n, k) matrix
D) Entropy Coding
encoding. (Hash based embedding). In addition, the original
image is not required to pull out the concealed message. The
receiver need only possess a key for disclosing the secret
message.
Stego System

KEY

Estimate of Stego
Message System

Fig. 5. Block Diagram of a Proposed System

Fig 5 shows that the sender recruits the message as text for
attaching on the cover image then it is processed with the help
of the rotation which means that it will be rotated by 85 so
that letters are slanted. It will helpful for our method and after
this JPEG compression is done which includes two
techniques. This data uploaded with the cover image and that
image not slanted in any manner. Send it to the receiver with
Fig. 4. Seven cover images the protected medium and at the end of the receiver key is
used for the decryption of the data which is hideen and
successfully receive it.
2016 Symposium on Colossal Data Analysis and Networking (CDAN)

V. RESULTS AND CONCLUSION

The imperceptibility and capacity of the data hiding are


inconsistent. So, the best technique is to take the human visual
system into story to measure a data hiding method. In this,
peak signal-to-noise ratio (PSNR) is used for the measurement
of imperceptibility and capacity for the amount of embedded
data. In our experiments, seven RGB images with dimensions
ranging from as small as 1920x1080 pixels up to 1920x1200
pixels is used. So the PSNR is calculated as

10 log 255
PSNR =
MSE

where MSE is the mean square error that is defined as

x x
MSE =
WH

Fig. 7. Seven Cover Images


We found that PSNR of LSB technique is smaller than PSNR
of our proposed technique, which shows that our technique is The results show that all the software possesses the ability to
better than existing technique for visual attacks. We did the hide the data without perceiving changes in their properties,
experiments in these seven images of fig 4. Fig 6 shows the more exclusively the image size. The entire extracted images
graph of the PSNR of both the techniques for different were clear without any distortion and shown in fig 7.
images.
Table 1: Result of LSB method and Proposed Method on Size, MSE and
PSNR

Size of file MSE PSNR

Original New LSB Proposed LSB Proposed

Art 979 kb 930 kb 34.23241 11.02253 34.23241 37.70799

Boat 881 kb 868 kb 18.27265 0.674729 35.51279 49.83951

Cartoon 1.24 mb 1.13 mb 20.12062 4.703858 35.09439 41.40626

City 1.12 mb 1.09 mb 18.06405 2.885264 35.56265 43.52895

Flower 1.01 mb 979 kb 3.878303 1.009436 42.24439 48.09002

Lion 1.23 mb 1.20 mb 14.94304 0.841397 36.38641 48.88079

Puppy 1.05 mb 1.04 mb 8.274764 1.249663 38.95328 47.16288

The results of the experiment shown in Table 1, reveal that all


the seven image size was reduced in the LSB technique, but
there is no change in the Stego images produced by the
Fig. 6. Comparision of PSNR for LSB and Proposed Algo proposed algorithm. The image quality that is measured after
embedding usually returns the success of Steganographic
system. The tool for measuring the quality of image after
2016 Symposium on Colossal Data Analysis and Networking (CDAN)

embedding the data is the PSNR. The values of PSNR are Modification Based on Private Stego-Keys, International Journal
of Computer Science and Security (IJCSS), vol. 4, (2010) March
achieved using the software under this study were all above
1.
the benchmark for the high quality image. 16) H. Yang, X. Sun and G. Sun, A High-Capacity Image Data
Hiding Scheme Using Adaptive LSB Substitution, Journal:
VI. CONCLUSION Radioengineering, vol. 18, no. 4, (2009), pp. 509-516.
17) K.-H. Jung, K.-J. Ha and K.-Y. Yoo, Image data hiding method
We conclude that the image quality of the stego-image can be based on multi-pixel differencing and LSB substitution methods,
Proc. 2008 International Conference on Convergence and Hybrid
greatly enhanced with low extra computational complexity. A Information Technology (ICHIT '08), Daejeon (Korea), (2008)
good balance between the security and the image quality is August 28-30, pp. 355-358.
achieved. This proposed algorithm is applicable on both gray 18) J, Corporation, Steganography. http://www.webopedia.com/
scale images & color images. It has also been concluded that TERM/S/steganography.html. 2005
proposed method is better than LSB based Steganography on
the basis of values of MSE & PSNR as shown by the
experimental results.

VII. REFERENCES

1) Ki-Hyun Jung, Kee-Young Yoo Steganographic method based on


interpolation and LSB substitution of digital images Springer
Science Business Media New York 2014 DOI 10.1007/s11042-
013-1832-y.

2) Aditi Soni, Sujit K. Badodia Architecture Of New Hiding


Technique For Projected & Compressed Text In Digital Image
International Journal Of Engineering Sciences & Research
Technology ISSN: 2277-9655 Volume 4.(11): November, 2015,
Page No. 145-149

3) Aditi Soni, Sujit K. Badodia Implementation Of Improved


Steganography For Hiding Text On Digital Data International
Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
Volume 4 Issue 11, November 2015, Page No. 80-84
4) Andreas Westfeld A Steganographic Algorithm High Capacity
Despite Better Steganalysis Springer-Verlag Berlin Heidelberg
2001 pp. 289302.
5) Ron Crandall: Some Notes on Steganography. Posted on
Steganography Mailing List, 1998. http://os.inf.tu-
dresden.de/westfeld/crandall.pdf
6) Borkar Bharat Sampatrao, Patil Pritesh Kashinath Stegnography
Of High Embedding Efficiency By Using An Extended Matrix
Encoding Algorithm Volume: 02 Issue: 05 | May-2013, Available
@ http://www.ijret.org
7) Westfeld A, Pfitzmann A. Attacks on steganographic systems.
Lect Notes ComputSci 2000;1768:6175.
8) Westfeld A. F5-a steganographic algorithm: high capacity despite
better steganalysis. Lect Notes ComputSci 2001;2137:289302.
9) Stefan Katzenbeiser & Fabien A.P.Petitcolas(1999), Information
Hiding Techniques for Steganography and Digital Watermarking,
Artech House, Computer Security series, Boston, London.
10) Chan CK, Cheng LM (2004) Hiding data in images by simple LSB
substitution. Pattern Recogn 37:469474
11) Chang CC, Lin MH, Hu YC (2002) A fast and secure image hiding
scheme based on LSB substitution. Int J Pattern Recog 16(4):399
416.
12) Johnson, Neil F., Steganography, 2000,
URL:http://www.jjtc.com/stegdoc/index2.html
13) Huang LC, Tseng LY, Hwang MS (2013) A reversible data hiding
method by histogram shifting in high quality medical images. J
Syst Software 86:716727
14) Johnson NF & Jajodia S (1998) Exploring steganography: seeing
the unseen. 26 34
15) Y. K. Jain and R. R. Ahirwal, A Novel Image Steganography
Method With Adaptive Number of Least Significant Bits

Potrebbero piacerti anche