SlideShare a Scribd company logo
1 of 5
Download to read offline
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 36-40
www.iosrjournals.org
www.iosrjournals.org 36 | Page
Efficient Technique for Image Stenography Based on coordinates
of pixels
S.Thenmozhli1
, Dr.M.Chandra sekaran2
1
(Research Scholar, Anna / Anna University, Chennai)
2
(HOD ECE , GCE / Anna University Name,Salem)
Abstract : A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment
is proposed. The proposed method is the extension of the diamond encoding embedding scheme. First, choosing
the cropped region from given cover image select 4 pixel pairs from cropped region, and one secret k-ary digit
is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit
and it can be obtained by adjusting pixel values in a block. Here embedding parameter k, and the block
capacity is equal to log2(2k2 + 2k + 1). The diamond encoding provides an easy way to produce a more
perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret
data can be extracted without disturbing the original cover image. Experimental results have demonstrated that
the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation
imperceptible.
Keywords – stegnography,pixel pair matching,lsb
I. INTRODUCTION
STEGANOGRAPHY is the art of hiding secret information in the form of cover which can be image
complex audio, video or any sophisticated biometrics formats Clearly, the goal of cryptography is to protect the
content of messages , steganography is to hide the existence of messages. An advantage of steganography is that
it can be employed to secretly transmit messages without the fact of the transmission being discovered.
Generically, the steganography process is classified into two phases in majority of the prior research work e.g.
message embedding and extraction. In the embedding operation, a secret message is transformed into a bit
stream of bits; this is embedded into the least significant bits (LSBs) of the image pixels. The embedding
overwrites the pixel LSB with the message bit if the pixel LSB and message bit do not match. Otherwise, no
changes are necessary. For the extraction operation, message bits are retrieved from pixel LSBs and combined
to form the secret message.
There are two main selection algorithms that can be employed to embed secret message bits:
sequential and random. For sequential selection, the locations of pixels used for embedding are selected
sequentially one after another. For instance, pixels are selected from left to right and top to bottom until all
message bits are embedded. With random selection, the locations of the pixels used for embedding are permuted
and distributed over the whole image. The distribution of the message bits is controlled by a pseudorandom
number generator whose seed is a secret shared by the sender and the receiver. This seed is also called the stego-
key. The latter selection method provides better security than the former because random selection scatters the
image distortion over the whole image, which makes it less perceptible.
II. PROPOSED METHOD
2.1 k ary notational matrix :
The proposed method is the extension of the exploiting embedding scheme is the main idea of
embedding scheme is that each (2n + 1)- k ary notational secret digit is carried by n cover pixels, and only one
pixel value increases or decreases by 1 at most. For each block of n cover pixels, there are 2n possible states of
only one pixel value plus 1 or minus 1.
The 2n states of alteration plus the case in which no pixel is modified form (2n + 1) different cases.
Therefore, the (2n + 1)- k ary notational secret digit is embedded into the cover pixels by changing the state.
Before the data embedding procedure, the preprocess can convert the secret data into sequences of digits with
(2n + 1)-k ary notational representation.
For the simplest case of n = 2, the secret data stream S(2) can be expressed as S(5) where S(d) denotes the
d-ary notational system representation of secret data stream S. Thus, the 5-ary digits can conceal into blocks of
two cover pixels by modifying at most one pixel value. Denote the gray values of a block of two cover pixels as
p1 and p2, and the extraction function f is deepened as a weighted sum modulo 5:
Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 37 | Page
Suppose that the transformed 5-ary secret digit s desired to be embedded into the cover pixels p1 and p2.
According to the secret digit, the embedding process can be classified into 5 conditions.
Condition 1. If (s − f (p1, p2)) mod 5 = 0:
No modification is needed because the extraction function f can decrypt the correct secret data.
Condition 2. If (s − f (p1, p2)) mod 5 = 1: Increase the pixel value p1 by 1.
Condition 3. If (s − f (p1, p2)) mod 5 = 2: Increase the pixel value p2 by 1.
Diamond encoding patterns with k = 1 and (b) diamond encoding patterns with k = 2.
Condition 4. If (s − f (p1, p2)) mod 5 = 3 Decrease the pixel value p2 by 1.
Condition 5. If (s − f (p1, p2)) mod 5 = 4: Decrease the pixel value p1 by 1.
Compute the two pixel values x and y by
f( x,y ) = ( (2k + 1) * x + y) mod l ---------- 1
The new stego-image pixel pair can be calculated by replacing f (x, y) with st . The used equation is shown as
follows:
dt = st − f (x,y) mod l. ----------- 2
st - embedded secretdigit st is obtained from the t th index of the sequence of lary mdigits.
2.2 Block Diagram :
2.2.1 Embedding Call back
Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 38 | Page
2.2.2 Extracting Callback
III. INDENTATIONS AND EQUATIONS
In this section, we shall introduce the general operation of the diamond encoding technique. The
proposed scheme embeds (2n + 1)- ary digit into n cover pixels, but the diamond encoding scheme can conceal
(2k2 + 2k + 1)- ary digit into a cover pixel pair where k is the embedding parameter. The detail of this scheme is
described as follows. Assume that a, b, p, and q are pixel values, and k is a positive integer. The neighborhood
set Sk(p, q) represents the set that contains all the vectors (a, b) with the distance to vector (p, q) smaller than
k, and Sk(p, q) is defined as the following form:
sk (p,q) = { (a,b) (p - q) + (q - b) <= k }; -------- 3
sk =number of elements of the set Sk, and each member in Sk is called neighboring vector of (p, q). the
following equations are used to be found sk
Sk = + ----------- 4
=
= 1 + ((k(k+1))) / 2 * 4 ;
= 1 + 2k(k+1);
= 2k2
+ 2k + 1;
For extraction we are using the following formula:
F (p’,q’) = _(2k + 1) × p’ + q’ mod l ------- 5
Here (p’ , q’) = coordinates of extracted pixel pairs
l = 2k2 +2k +1. ------------- 6
Here is an example to describe how the proposed algorithm actually works. Assume that the
embedding parameter k = 2 and l = 13. Suppose we have pixel pairs x = 20 and y = 31 and we use (4) to
calculate DCV by computing f (20, 31) = (20 × 5 + 31)mod13 = 1. Now let us take st = 11(13) as the embedded
secret digit, and we can obtain the modulus distance dt = 11−1mod 13 = 10 by computing Then, we search
D2(20, 31) which is shown in Figure 2 and obtain the neighboring vector (22, 31) locating in set S2(20, 31) and
dk = 10. Therefore, the values of pixel pair (20, 31) are replaced with (22, 31).
In the secret data extraction phase, the stego-pixel pairs x_ = 22 and y_ = 31 can be used to
compute the DCV by f (22, 31) = 22 × 5 + 28mod13 = 11. Finally, the secret digit st is obtained.
Stego image pixel
pair
Neighbour matrix
Modulus distance calculate
Secret Data
Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 39 | Page
IV. FIGURES AND TABLES
4 .1 Resulting Images
In this paper five cover images Lena, Zelda, of 128×128 pixels as shown in the figure 4. 1a, 1b, 2 a,2b
are considered. Then to evaluate the performance of the proposed method, several experiments have been
carried by considering for secret text . The results of above algorithm have been shown below
Fig (1 a) input image Fig (2 a) input image
Fig (1 b) stego image Fig (2 b) stego image
In our experiments, the quality of the stego-image is measured by the peak signal-to-noise ratio
(PSNR). The PSNR is the most popular metris to measure the distortion between the cover image and stego-
image. It is defined as follows:
PSNR = 10 log 10 (255 *255 / MSE)
MSE = (1/ M X N) (I/p img – O/p img)^2
4.4 Table Comparison :
Smaller k means low capacity and less distortion whereas larger k means high capacity and increased
distortion. As expected, Table 1 shows that the growth of payload did depend on the value k. The third column
of Table 1 indicates that the numbers of pixels payload is nothing but no of bits to be embedded in an cover
image Results of the proposed scheme with different parameter k
Table 1
K value Sk Payload Psnr
1 1.16 52
2 13 1.85 49
3 25 2.32 47
4 41 2.68 42
V. CONCLUSION
In this paper, we have presented a novel data hiding scheme based on the pixel pair matching
technique. The diamond encoding method has been used to alleviate distortions after hiding a secret digit into
two cover pixels. It not only keeps high stego-image quality but also considering large amount of data into cover
Efficient Technique for Image Stenography Based on coordinates of pixels
www.iosrjournals.org 40 | Page
images for secret communication. The performance of the proposed method proves to be better than the simple
and modify LSB method and other existing schemes in terms of payload and stego-image quality.
Acknowledgements
This research project would not have been possible without the support of many people. The author
wishes to express her gratitude to her supervisor, Prof. Dr . Chandra sekaran HOD / ECE Government Collgege
of engg Salem who was abundantly helpful and offered invaluable assistance, support and guidance
REFERENCES
[1] S.-H. Wang and Y.-P. Lin, ―Wavelet tree quantization for copyright protection watermarking,‖ IEEE Transactions on Image
Processing, vol. 13, no. 2, pp. 154–165, 2004.
[2] D.-C. Lou and J.-L. Liu, ―Steganographic method for secure communications,‖ Computers and Security, vol. 21, no. 5, pp. 449–
460, 2002.
[3] P. L. Lin, C.-K. Hsieh, and P.-W. Huang, ―A hierarchical digital watermarking method for image tamper detection and recovery,‖
Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, 2005.
[4] P. W. Wong and N. Memon, ―Secret and public key image watermarking schemes for image authentication and
ownershipverification,‖ IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001.
[5] C.-K. Chan and L. M. Cheng, ―Hiding data in images by simple LSB substitution,‖ Pattern Recognition, vol. 37, no. 3,pp. 469–474,
2004.
[6] Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, ―A secure data hiding scheme for binary images,‖ IEEE Transactions onCommunications,
vol. 50, no. 8, pp. 1227–1231, 2002.
[7] A.Westfeld, ―F5—a steganographic algorithm,‖ in Proceedings of the 4th International Workshop on Information Hiding(IH ’01),
vol. 2137 of Lecture Notes in Computer Science, pp. 289–302, Pittsburgh, Pa, USA, April 2001.

More Related Content

What's hot

Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
mourya chandra
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 

What's hot (7)

Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
2-D array
2-D array2-D array
2-D array
 
Pixelrelationships
PixelrelationshipsPixelrelationships
Pixelrelationships
 
11 clusadvanced
11 clusadvanced11 clusadvanced
11 clusadvanced
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Data scientist training in bangalore
Data scientist training in bangaloreData scientist training in bangalore
Data scientist training in bangalore
 

Viewers also liked

Web log evaluation
Web log evaluationWeb log evaluation
Web log evaluation
Temibaybee
 
Two household items
Two household itemsTwo household items
Two household items
mharish9
 
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
IOSR Journals
 
Libro de rosa maria
Libro de rosa mariaLibro de rosa maria
Libro de rosa maria
luisariza16
 
тестфонетика9 класса
тестфонетика9 классатестфонетика9 класса
тестфонетика9 класса
Natalya Dyrda
 

Viewers also liked (19)

H0934549
H0934549H0934549
H0934549
 
The juggler's brain final
The juggler's brain finalThe juggler's brain final
The juggler's brain final
 
Web log evaluation
Web log evaluationWeb log evaluation
Web log evaluation
 
audition
auditionaudition
audition
 
Two household items
Two household itemsTwo household items
Two household items
 
How to Create an Effective Imagefest Slideshow
How to Create an Effective Imagefest SlideshowHow to Create an Effective Imagefest Slideshow
How to Create an Effective Imagefest Slideshow
 
лицей пушкина
лицей пушкиналицей пушкина
лицей пушкина
 
Ficointerviewquestionsandanswers
FicointerviewquestionsandanswersFicointerviewquestionsandanswers
Ficointerviewquestionsandanswers
 
K0347480 copy
K0347480   copyK0347480   copy
K0347480 copy
 
I0925259
I0925259I0925259
I0925259
 
D0532025
D0532025D0532025
D0532025
 
C0931115
C0931115C0931115
C0931115
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина Земли
 
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
Effect of Replacement of Sweet Orange (Citrus Sinensis) Peel Meal with Maize ...
 
I0445159
I0445159I0445159
I0445159
 
Libro de rosa maria
Libro de rosa mariaLibro de rosa maria
Libro de rosa maria
 
Trashing Utopia 2015
Trashing Utopia   2015 Trashing Utopia   2015
Trashing Utopia 2015
 
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
Combining both Plug-in Vehicles and Renewable Energy Resources for Unit Commi...
 
тестфонетика9 класса
тестфонетика9 классатестфонетика9 класса
тестфонетика9 класса
 

Similar to Efficient Technique for Image Stenography Based on coordinates of pixels

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
cscpconf
 

Similar to Efficient Technique for Image Stenography Based on coordinates of pixels (20)

Is3314841490
Is3314841490Is3314841490
Is3314841490
 
E0152531
E0152531E0152531
E0152531
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIPVARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
VARIATION-FREE WATERMARKING TECHNIQUE BASED ON SCALE RELATIONSHIP
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
 
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...
 
Bt32444450
Bt32444450Bt32444450
Bt32444450
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
Ijcatr03051008Implementation of Matrix based Mapping Method Using Elliptic Cu...
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVINA MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
A MEDIAN BASED DIRECTIONAL CASCADED WITH MASK FILTER FOR REMOVAL OF RVIN
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
C010231217
C010231217C010231217
C010231217
 
Efficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference MatrixEfficient & Secure Data Hiding Using Secret Reference Matrix
Efficient & Secure Data Hiding Using Secret Reference Matrix
 
Chapter 06 eng
Chapter 06 engChapter 06 eng
Chapter 06 eng
 
1. updated document ed sat
1. updated document ed sat1. updated document ed sat
1. updated document ed sat
 

More from IOSR Journals

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 

Recently uploaded (20)

Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best ServiceTamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 

Efficient Technique for Image Stenography Based on coordinates of pixels

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 11, Issue 2 (May. - Jun. 2013), PP 36-40 www.iosrjournals.org www.iosrjournals.org 36 | Page Efficient Technique for Image Stenography Based on coordinates of pixels S.Thenmozhli1 , Dr.M.Chandra sekaran2 1 (Research Scholar, Anna / Anna University, Chennai) 2 (HOD ECE , GCE / Anna University Name,Salem) Abstract : A novel data hiding scheme in digital images with the diamond encoding by pixel value adjustment is proposed. The proposed method is the extension of the diamond encoding embedding scheme. First, choosing the cropped region from given cover image select 4 pixel pairs from cropped region, and one secret k-ary digit is concealed into the diamond characteristic value. The diamond characteristic value is modified to secret digit and it can be obtained by adjusting pixel values in a block. Here embedding parameter k, and the block capacity is equal to log2(2k2 + 2k + 1). The diamond encoding provides an easy way to produce a more perceptible result than those yielded by simple least-significant-bit substitution methods. The embedded secret data can be extracted without disturbing the original cover image. Experimental results have demonstrated that the proposed method is capable of hiding more secret data while keeping the stego-image quality degradation imperceptible. Keywords – stegnography,pixel pair matching,lsb I. INTRODUCTION STEGANOGRAPHY is the art of hiding secret information in the form of cover which can be image complex audio, video or any sophisticated biometrics formats Clearly, the goal of cryptography is to protect the content of messages , steganography is to hide the existence of messages. An advantage of steganography is that it can be employed to secretly transmit messages without the fact of the transmission being discovered. Generically, the steganography process is classified into two phases in majority of the prior research work e.g. message embedding and extraction. In the embedding operation, a secret message is transformed into a bit stream of bits; this is embedded into the least significant bits (LSBs) of the image pixels. The embedding overwrites the pixel LSB with the message bit if the pixel LSB and message bit do not match. Otherwise, no changes are necessary. For the extraction operation, message bits are retrieved from pixel LSBs and combined to form the secret message. There are two main selection algorithms that can be employed to embed secret message bits: sequential and random. For sequential selection, the locations of pixels used for embedding are selected sequentially one after another. For instance, pixels are selected from left to right and top to bottom until all message bits are embedded. With random selection, the locations of the pixels used for embedding are permuted and distributed over the whole image. The distribution of the message bits is controlled by a pseudorandom number generator whose seed is a secret shared by the sender and the receiver. This seed is also called the stego- key. The latter selection method provides better security than the former because random selection scatters the image distortion over the whole image, which makes it less perceptible. II. PROPOSED METHOD 2.1 k ary notational matrix : The proposed method is the extension of the exploiting embedding scheme is the main idea of embedding scheme is that each (2n + 1)- k ary notational secret digit is carried by n cover pixels, and only one pixel value increases or decreases by 1 at most. For each block of n cover pixels, there are 2n possible states of only one pixel value plus 1 or minus 1. The 2n states of alteration plus the case in which no pixel is modified form (2n + 1) different cases. Therefore, the (2n + 1)- k ary notational secret digit is embedded into the cover pixels by changing the state. Before the data embedding procedure, the preprocess can convert the secret data into sequences of digits with (2n + 1)-k ary notational representation. For the simplest case of n = 2, the secret data stream S(2) can be expressed as S(5) where S(d) denotes the d-ary notational system representation of secret data stream S. Thus, the 5-ary digits can conceal into blocks of two cover pixels by modifying at most one pixel value. Denote the gray values of a block of two cover pixels as p1 and p2, and the extraction function f is deepened as a weighted sum modulo 5:
  • 2. Efficient Technique for Image Stenography Based on coordinates of pixels www.iosrjournals.org 37 | Page Suppose that the transformed 5-ary secret digit s desired to be embedded into the cover pixels p1 and p2. According to the secret digit, the embedding process can be classified into 5 conditions. Condition 1. If (s − f (p1, p2)) mod 5 = 0: No modification is needed because the extraction function f can decrypt the correct secret data. Condition 2. If (s − f (p1, p2)) mod 5 = 1: Increase the pixel value p1 by 1. Condition 3. If (s − f (p1, p2)) mod 5 = 2: Increase the pixel value p2 by 1. Diamond encoding patterns with k = 1 and (b) diamond encoding patterns with k = 2. Condition 4. If (s − f (p1, p2)) mod 5 = 3 Decrease the pixel value p2 by 1. Condition 5. If (s − f (p1, p2)) mod 5 = 4: Decrease the pixel value p1 by 1. Compute the two pixel values x and y by f( x,y ) = ( (2k + 1) * x + y) mod l ---------- 1 The new stego-image pixel pair can be calculated by replacing f (x, y) with st . The used equation is shown as follows: dt = st − f (x,y) mod l. ----------- 2 st - embedded secretdigit st is obtained from the t th index of the sequence of lary mdigits. 2.2 Block Diagram : 2.2.1 Embedding Call back
  • 3. Efficient Technique for Image Stenography Based on coordinates of pixels www.iosrjournals.org 38 | Page 2.2.2 Extracting Callback III. INDENTATIONS AND EQUATIONS In this section, we shall introduce the general operation of the diamond encoding technique. The proposed scheme embeds (2n + 1)- ary digit into n cover pixels, but the diamond encoding scheme can conceal (2k2 + 2k + 1)- ary digit into a cover pixel pair where k is the embedding parameter. The detail of this scheme is described as follows. Assume that a, b, p, and q are pixel values, and k is a positive integer. The neighborhood set Sk(p, q) represents the set that contains all the vectors (a, b) with the distance to vector (p, q) smaller than k, and Sk(p, q) is defined as the following form: sk (p,q) = { (a,b) (p - q) + (q - b) <= k }; -------- 3 sk =number of elements of the set Sk, and each member in Sk is called neighboring vector of (p, q). the following equations are used to be found sk Sk = + ----------- 4 = = 1 + ((k(k+1))) / 2 * 4 ; = 1 + 2k(k+1); = 2k2 + 2k + 1; For extraction we are using the following formula: F (p’,q’) = _(2k + 1) × p’ + q’ mod l ------- 5 Here (p’ , q’) = coordinates of extracted pixel pairs l = 2k2 +2k +1. ------------- 6 Here is an example to describe how the proposed algorithm actually works. Assume that the embedding parameter k = 2 and l = 13. Suppose we have pixel pairs x = 20 and y = 31 and we use (4) to calculate DCV by computing f (20, 31) = (20 × 5 + 31)mod13 = 1. Now let us take st = 11(13) as the embedded secret digit, and we can obtain the modulus distance dt = 11−1mod 13 = 10 by computing Then, we search D2(20, 31) which is shown in Figure 2 and obtain the neighboring vector (22, 31) locating in set S2(20, 31) and dk = 10. Therefore, the values of pixel pair (20, 31) are replaced with (22, 31). In the secret data extraction phase, the stego-pixel pairs x_ = 22 and y_ = 31 can be used to compute the DCV by f (22, 31) = 22 × 5 + 28mod13 = 11. Finally, the secret digit st is obtained. Stego image pixel pair Neighbour matrix Modulus distance calculate Secret Data
  • 4. Efficient Technique for Image Stenography Based on coordinates of pixels www.iosrjournals.org 39 | Page IV. FIGURES AND TABLES 4 .1 Resulting Images In this paper five cover images Lena, Zelda, of 128×128 pixels as shown in the figure 4. 1a, 1b, 2 a,2b are considered. Then to evaluate the performance of the proposed method, several experiments have been carried by considering for secret text . The results of above algorithm have been shown below Fig (1 a) input image Fig (2 a) input image Fig (1 b) stego image Fig (2 b) stego image In our experiments, the quality of the stego-image is measured by the peak signal-to-noise ratio (PSNR). The PSNR is the most popular metris to measure the distortion between the cover image and stego- image. It is defined as follows: PSNR = 10 log 10 (255 *255 / MSE) MSE = (1/ M X N) (I/p img – O/p img)^2 4.4 Table Comparison : Smaller k means low capacity and less distortion whereas larger k means high capacity and increased distortion. As expected, Table 1 shows that the growth of payload did depend on the value k. The third column of Table 1 indicates that the numbers of pixels payload is nothing but no of bits to be embedded in an cover image Results of the proposed scheme with different parameter k Table 1 K value Sk Payload Psnr 1 1.16 52 2 13 1.85 49 3 25 2.32 47 4 41 2.68 42 V. CONCLUSION In this paper, we have presented a novel data hiding scheme based on the pixel pair matching technique. The diamond encoding method has been used to alleviate distortions after hiding a secret digit into two cover pixels. It not only keeps high stego-image quality but also considering large amount of data into cover
  • 5. Efficient Technique for Image Stenography Based on coordinates of pixels www.iosrjournals.org 40 | Page images for secret communication. The performance of the proposed method proves to be better than the simple and modify LSB method and other existing schemes in terms of payload and stego-image quality. Acknowledgements This research project would not have been possible without the support of many people. The author wishes to express her gratitude to her supervisor, Prof. Dr . Chandra sekaran HOD / ECE Government Collgege of engg Salem who was abundantly helpful and offered invaluable assistance, support and guidance REFERENCES [1] S.-H. Wang and Y.-P. Lin, ―Wavelet tree quantization for copyright protection watermarking,‖ IEEE Transactions on Image Processing, vol. 13, no. 2, pp. 154–165, 2004. [2] D.-C. Lou and J.-L. Liu, ―Steganographic method for secure communications,‖ Computers and Security, vol. 21, no. 5, pp. 449– 460, 2002. [3] P. L. Lin, C.-K. Hsieh, and P.-W. Huang, ―A hierarchical digital watermarking method for image tamper detection and recovery,‖ Pattern Recognition, vol. 38, no. 12, pp. 2519–2529, 2005. [4] P. W. Wong and N. Memon, ―Secret and public key image watermarking schemes for image authentication and ownershipverification,‖ IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001. [5] C.-K. Chan and L. M. Cheng, ―Hiding data in images by simple LSB substitution,‖ Pattern Recognition, vol. 37, no. 3,pp. 469–474, 2004. [6] Y.-C. Tseng, Y.-Y. Chen, and H.-K. Pan, ―A secure data hiding scheme for binary images,‖ IEEE Transactions onCommunications, vol. 50, no. 8, pp. 1227–1231, 2002. [7] A.Westfeld, ―F5—a steganographic algorithm,‖ in Proceedings of the 4th International Workshop on Information Hiding(IH ’01), vol. 2137 of Lecture Notes in Computer Science, pp. 289–302, Pittsburgh, Pa, USA, April 2001.