Your SlideShare is downloading. ×
Minimizing additive distortion in steganography using syndrome trellis codes
Minimizing additive distortion in steganography using syndrome trellis codes
Minimizing additive distortion in steganography using syndrome trellis codes
Minimizing additive distortion in steganography using syndrome trellis codes
Minimizing additive distortion in steganography using syndrome trellis codes
Minimizing additive distortion in steganography using syndrome trellis codes
Minimizing additive distortion in steganography using syndrome trellis codes
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Minimizing additive distortion in steganography using syndrome trellis codes

254

Published on

For more projects visit @ www.nanocdac.com

For more projects visit @ www.nanocdac.com

Published in: Technology, Art & Photos
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
254
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Minimizing Additive Distortion in SteganographyUsing Syndrome-Trellis CodesABSTRACT:This paper proposes a complete practical methodology for minimizing additive distortionin steganography with general (nonbinary) embedding operation. Let every possiblevalue of every stego element be assigned a scalar expressing the distortion of anembedding change done by replacing the cover element by this value. The total distortionis assumed to be a sum of per-element distortions. Both the payload-limited sender(minimizing the total distortion while embedding a fixed payload) and the distortion-limited sender (maximizing the payload while introducing a fixed total distortion) areconsidered. Without any loss of performance, the nonbinary case is decomposed intoseveral binary cases by replacing individual bits in cover elements. The binary case isapproached using a novel syndrome-coding scheme based on dual convolutional codesequipped with the Viterbi algorithm. This fast and very versatile solution achieves state-of-the-art results in steganographic applications while having linear time and spacecomplexity w.r.t. the number of cover elements. We report extensive experimental resultsfor a large set of relative payloads and for different distortion profiles, including the wetpaper channel. Practical merit of this approach is validated by constructing and testingadaptive embedding schemes for digital images in raster and transform domains. Mostcurrent coding schemes used in steganography (matrix embedding, wet paper codes, etc.)and many new ones can be implemented using this framework.www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 2. EXISTING SYSTEM:• In special domain, the hiding process such as least significant bit(LSB)replacement, is done in special domain, while transform domain methods; hidedata in another domain such as wavelet domain.• Least significant bit (LSB) is the simplest form of Steganography. LSB is basedon inserting data in the least significant bit of pixels, which lead to a slight changeon the cover image that is not noticeable to human eye. Since this method can beeasily cracked, it is more vulnerable to attacks.• LSB method has intense affects on the statistical information of image likehistogram. Attackers could be aware of a hidden communication by just checkingthe Histogram of an image. A good solution to eliminate this defect was LSBmatching. LSB-Matching was a great step forward in Steganography methods andmany others get ideas from itPROPOSED SYSTEM:• In this paper it is planned to introduce a method that embed 2 bits information in apixel and alter one bit from one bit plane but the message does not necessarilyplace in the least significant bit of pixel and second less significant bit plane andfourth less significant bit plane can also host the massage.• Since in our method for embedding two bits message we alter just one bit plane,fewer pixels would be manipulated during embedding message in an image and itis expected for the steganalysis algorithm to have more difficulty detecting thewww.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 3. covert communication. It is clear that in return complexity of the system wouldincrease.• In our method there are only three ways that a pixel is allowed to be changed:o Its least significant Bit would alter (So the gray level of the pixel wouldincreased or decreased by one level)o The second less significant bit plane would alter (So the gray level of thepixel would increase or decrease by two levels)o The fourth less significant bit plane would alter (So the gray level of thepixel would increase or decrease by eight levels)ADVANTAGES• User cannot find the original data.• It is not easily cracked.• To increase the Security .• To increase the size of stored data.• We can hide more than one bit.www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 4. HARDWARE REQUIREMENTSProcessor : Any Processor above 500 MHz.Ram : 128Mb.Hard Disk : 10 GB.Compact Disk : 650 Mb.Input device : Standard Keyboard and Mouse.Output device : VGA and High Resolution MonitorSOFTWARE REQUIREMENTSOperating System : Windows XP.Coding Language : JAVASimulation : MATLAB (for checking Histogram of Original &Stegno image)MODULE:• Input Module :• Watermark embeddingwww.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 5. • Authenticator Watermark• Spread Spectrum• Watermarked contentModules Description:1) Input Module :The Input Module is designed as such a way that the proposed system must becapable of handling any type of data formats, such as if the user wishes to hide any imageformat then it must be compatible with all usual image formats such as jpg, gif, bmp, itmust be also compatible with video formats such as avi,flv,wmf etc.. and also it must becompatible with various document formats, so that the user can be able to user anyformats to hide the secret data.2) Watermark embedding :Watermarking is a technology for embedding various types of information indigital content. In general, information for protecting copyrights and proving the validityof data is embedded as a watermark. Watermarked content can prove its origin, therebyprotecting the data.www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 6. 3) Authenticator Watermark :In this module we encrypt the data embedded image. The purpose of authenticatorwatermark of a block is invariant in the watermark embedding process; hence thewatermark can be extracted without referring to the original content .The encryption anddecryption techniques used in this module.4) Spread Spectrum :We flip an edge pixel in binary images is equivalent to shifting the edge locationhorizontally one pixel and vertically one pixel. A horizontal edge exists if there is atransition between two neighboring pixels vertically and a vertical edge exists if there is atransition between two neighboring pixels horizontally. We use spread spectrumwatermark morphological content.5) Watermarked contentThe watermarked content is obtained by computing the inverse for the mainprocessing block to reconstruct its candidate pixels. Use this module we going to see theoriginal and watermarked content.REFERENCE:Tomas Filler, Jan Judas, and Jessica Fridrich, “Minimizing Additive Distortion inSteganography Using Syndrome-Trellis Codes”, IEEE Transactions on InformationForensics and Security, Vol.6, No.3, September 2011.www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur
  • 7. 3) Authenticator Watermark :In this module we encrypt the data embedded image. The purpose of authenticatorwatermark of a block is invariant in the watermark embedding process; hence thewatermark can be extracted without referring to the original content .The encryption anddecryption techniques used in this module.4) Spread Spectrum :We flip an edge pixel in binary images is equivalent to shifting the edge locationhorizontally one pixel and vertically one pixel. A horizontal edge exists if there is atransition between two neighboring pixels vertically and a vertical edge exists if there is atransition between two neighboring pixels horizontally. We use spread spectrumwatermark morphological content.5) Watermarked contentThe watermarked content is obtained by computing the inverse for the mainprocessing block to reconstruct its candidate pixels. Use this module we going to see theoriginal and watermarked content.REFERENCE:Tomas Filler, Jan Judas, and Jessica Fridrich, “Minimizing Additive Distortion inSteganography Using Syndrome-Trellis Codes”, IEEE Transactions on InformationForensics and Security, Vol.6, No.3, September 2011.www.nanocdac.com www.nsrcnano.com branches: hyderabad nagpur

×