SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5




                Tree Based Parity Check Scheme for Data Hiding
                       1
                           Sampath Kumar Dara, 2 Harshavardhan Awari
    *1 Assoc. Professor, Department of Electronics and Communication Engineering, Vaageswari College of Engg,
                                                  Karimnagar, A.P
 *2 Assoc.Professor, Department of Computer Science Engineering, Vaageswari College of Engg, Karimnagar, A.P.




Abstract
The information hiding deals with distortion                               Codes to improve the computational
reduction using steganography and security                         complexity of wet paper codes derive d a hash
enhancement      using   cryptography.     Distortion              function to efficiently obtain the stego object.
reduction is done using Tree Based Parity Check                    Proposed a scheme called tree-based parity check.
which uses Majority vote strategy. The Tree Based
Parity Check is very optimal for cloaking a message
on image. The proposed majority vote strategy results
in least distortion. The SHA-1 algorithm is
implemented for security enhancement. The result
obtained in proposed method works effectively even
with large payload.

Key Words— Image coding, information security,
Stenography.
                                                                   Fig. 1. Master and toggle strings of a master tree with
 I.    I NTRODUCTION                                               for LSBs 0, 1, 1, 0, 1, 0, 1 o f the cove r object.
Stenography studies the scheme to hide secrets into
                                                                   (TBPC) to reduce distortion on a cover object based
the communication between the sender and the
                                                                   on a tree structure.
receive r such that no other people can detect the
existence of the secrets. A steganographic method
                                                                            The embedding efficiency is defined to be
consists of an embedding algorithm and an extraction
                                                                   the number of hidden message bits per embedding
algorithm. The embedding algorithm describes how t
                                                                   modification. Higher embedding efficiency implies
o hide a message into the
                                                                   better undetectability for steganographic methods.
cover object and the extraction algorithm illustrates
                                                                   The lower embedding efficiency is defined to be the
how to extract the message from the stego object. A
                                                                   ratio of the number of hidden message bits to the
commonly used strategy for steganography is to
                                                                   maximum embedding modifications. The lower
embed the message by slightly distorting the cove r
                                                                   embedding efficiency is related to undetectability in
object into the target stego object. If the distortion is
                                                                   the worst case. It implies steganographic security in
sufficiently small, the stego object will be
                                                                   the worst case.
indistinguishable from the noisy cove r object.
Therefore, reducing distortion is a crucial issue for
steganographic methods. In this paper, we propose an
                                                                    II.       TBPC METHOD
                                                                            Before embedding and extraction, a location
efficient embedding scheme that uses the least
                                                                   finding method determines a sequence of locations
number of changes over the tree-based parity check
                                                                   that point to elements in the cover object. The
model.
                                                                   embedding algorithm modifies the elements in these
                                                                   locations to hide the message and the extraction
          The ideas of matrix embedding and defined
                                                                   algorithm can recover the message by inspecting the
the codes with the matrix as steganographic codes.
                                                                   same sequence of locations. The TBPC method is a
For matrix embedding, finding the stego object with
                                                                   least significant bit (LSB) steganographic method.
least distortion is difficult in general. In some special
                                                                   Only the LSBs of the elements pointed by the
cases, there exist constructive and fast methods. LT
                                                                   determined locations are used for embedding and
Issn 2250-3005(online)                                      September| 2012                                   Page 1200
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5




extraction. The TBPC method constructs a complete
N-ary tree, called the master tree, to represent the
LSBs of the cover object. Then it fills the nodes of
the master tree with the LSBs of the cover object
level by level, from top to bottom and left to right.
Every node of the tree corresponds to an LSB in the
cover object. Denote the number of leaves of the
master tree by L. The TBPC embedding algorithm
derives an L-bit binary string, called the master
string, by performing parity check on the master tree
from the root to the leaves (e.g., see Fig. 1.). The
embedding algorithm hides the message by
modifying the bit values of some nodes in the master
tree. Assume that the length of the message is also L.
Performing the bitwise exclusive-or (XOR) operation
between the message and the master string, we obtain
a toggle string (e.g., see Fig. 1). Then, the embedding
algorithm constructs a new complete N-ary tree,
called the toggle tree in the bottom-up order and fills
the leaves with the bit values of the toggle string and
the other nodes with 0. Then, level by level, from the
bottom to the root, each nonleaf node together with
its child nodes are flipped if all its child nodes have
bits 1 (e.g., see Fig. 2). The embedding algorithm
obtains the stego tree by performing XOR between
the master tree and the toggle tree (e.g., see Fig. 3).
The TBPC extraction algorithm is simple. We can
extract the message by performing parity check on                 Fig. 2. Construction of a toggle tree with          for
each root-leaf path of the stego tree from left to right.         toggle string 0, 1, 1, 1.

 III.    Majority Vote Strategy
Two critical issues for a steganographic method are:
1) Reducing distortion on cover objects

2) Better efficiency for embedding and extraction.
We give a majority vote strategy on building the
toggle tree. It uses the least number of 1’s under the
TBPC model. Since the number of 1’s in the toggle
tree is the number of modifications on the master tree
(i.e., the cover object), the majority vote strategy can
produce a stego tree with least distortion on the
master tree. The proposed method uses a set of                    Fig. 3. Modify the master tree into the stego tree by
standard measures, to capture image properties before             the toggle tree constructed from the toggle string 0, 1,
or after the embedding process, which effect the                  1, 1.
performance of steganalysis techniques. These
measures are divided into two categories. First cover                      First, index all nodes of a complete -ary
image properties, and second cover-stego based                    tree with leave s from top to bottom and left to right.
distortion measures.                                              Set the bit toggle string bit by bit into the leave s
                                                                  from left to right and the other nodes 0. Assume that
                                                                  the level of the tree is. Traverse all nonleaf nodes
                                                                  from level 1 to. A nonleaf node and its child nodes
                                                                  form a simple complete subtree. For each simple
                                                                  complete subtree, if the majority of the child nodes
                                                                  hold 1, then flip the bit values of all nodes in this
Issn 2250-3005(online)                                     September| 2012                                    Page 1201
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5




subtree. Since the construction is bottom-up, the bit           References
values of the child nodes in every simple complete              [1]    S. Chang Chun Lu, Shi-Chun Tsai, and Wen-
subtree are set after step 3. Note that marking a node                 Guey Tzeng, ‖ An Optimal Data Hiding
at step 4 applies only for being even. When is                         Scheme With Tree-Based Parity Check‖ in
even, after step 3, there may exist a two level simple                 IEEE Trans. on Image Processing, vol. 20,
complete subtree with 1’s in the child nodes and 1 in                  no. 3, Mar 2011.
its root. In this case, flipping the bit values in this          [2]   J. Fridrich, M. Goljan, and D. Soukal,
simple complete subtree results in one fewer node                      ―Efficient wet paper codes,‖ in Proc. 7th
holding 1 and keeps the result of related root-leaf                    Int. Workshop Information Hiding (IHW 05),
path parity check unchanged. Step 4 takes care of this                 vol. 3727, pp. 204–218, Apr 2005.
when the condition applies, and it is done level b y            [3]    J. Fridrich and D. Soukal, ―Matrix
level from top to bottom. Also note that for the root                  embedding for large payloads,‖ in IEEE
of the whole toggle tree, the bit value is always 0                    Trans. on        Information Forensics and
when half of its child nodes hold 1. Thus, after step 4,               Security, vol. 1, no. 3, pp. 390–395, Sep.
the bit values of the child nodes in each simple                       2006.
complete subtree are determined.                                [4]    M. Khatirinejad and P. Lisonek, ―Linear
                                                                       codes for high payload steganography,‖ in
 IV.     Experimental Results                                          IEEE      Trans.    on    Discrete    Applied
To make it clear, we define the percentage of reduced                  Mathematics, vol. 157, no. 5, pp. 971–981,
modifications as follows:                                              2009.
p Reduce = Rt/Dt                                                [5]    W. Zhang and X. Wang, ‖Generalization of
  Where Rt is the reduced number of 1’s in the toggle                  the ZZW embedding           construction for
tree and Dt is the number of 1’s in the toggle string.                 Steganography,‖        in IEEE Trans. on
The p Reduce values of both methods are shown in                       Information Forensics and Security, pp.564-
Fig. 4.                                                                569, Jan 2009.
                                                                [6]    J. Fridrich, M. Goljan, P. Lisonek, and D.
                                                                       Soukal, ―Writing on wet paper,‖ in IEEE
                                                                       Trans. on Signal Processing., vol. 53, no. 10,
                                                                       pp. 3923–3935, Oct. 2005.




Fig.4. p Toggle comparison of MPC and TBPC.

The results show that the MPC method significantly
improves previous TBPC results.

 V.      Conclusion
         By introducing the majority vote strategy,
the stego object is constructed with least distortion
under the tree structure model. We also show that our
method yields a binary linear stego-code and
preserves the secrecy of the hidden data. In
comparison with the TBPC method, the proposed
MPC method significantly reduces the number of
modifications on average.




Issn 2250-3005(online)                                   September| 2012                                 Page 1202

More Related Content

What's hot

Compression technique using dct fractal compression
Compression technique using dct fractal compressionCompression technique using dct fractal compression
Compression technique using dct fractal compressionAlexander Decker
 
11.compression technique using dct fractal compression
11.compression technique using dct fractal compression11.compression technique using dct fractal compression
11.compression technique using dct fractal compressionAlexander Decker
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMIDES Editor
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionIJCSIS Research Publications
 
Acoustic modeling using deep belief networks
Acoustic modeling using deep belief networksAcoustic modeling using deep belief networks
Acoustic modeling using deep belief networksYueshen Xu
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...IJRES Journal
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Alexander Decker
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...ijait
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSREHMAT ULLAH
 

What's hot (20)

Compression technique using dct fractal compression
Compression technique using dct fractal compressionCompression technique using dct fractal compression
Compression technique using dct fractal compression
 
11.compression technique using dct fractal compression
11.compression technique using dct fractal compression11.compression technique using dct fractal compression
11.compression technique using dct fractal compression
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
I017535359
I017535359I017535359
I017535359
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Image recognition
Image recognitionImage recognition
Image recognition
 
Self Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOMSelf Attested Images for Secured Transactions using Superior SOM
Self Attested Images for Secured Transactions using Superior SOM
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware Detection
 
Acoustic modeling using deep belief networks
Acoustic modeling using deep belief networksAcoustic modeling using deep belief networks
Acoustic modeling using deep belief networks
 
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
Implementation of Securing Confidential Data by Migrating Digital Watermarkin...
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125
 
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
Signal to-noise-ratio of signal acquisition in global navigation satellite sy...
 
C010231217
C010231217C010231217
C010231217
 
W4301117121
W4301117121W4301117121
W4301117121
 
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
COMPARISON OF SECURE AND HIGH CAPACITY COLOR IMAGE STEGANOGRAPHY TECHNIQUES I...
 
Artificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKSArtificial intelligence NEURAL NETWORKS
Artificial intelligence NEURAL NETWORKS
 
Hk3312911294
Hk3312911294Hk3312911294
Hk3312911294
 
Et25897899
Et25897899Et25897899
Et25897899
 
Bz02516281633
Bz02516281633Bz02516281633
Bz02516281633
 
Ijnsa050213
Ijnsa050213Ijnsa050213
Ijnsa050213
 

Similar to Tree Based Parity Check Scheme Reduces Distortion for Data Hiding

Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Publishing House
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...eSAT Journals
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...ijsrd.com
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyIRJET Journal
 
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...rinzindorjej
 
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...rinzindorjej
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451IJRAT
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...nooriasukmaningtyas
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesIJERA Editor
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMIJNSA Journal
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classificationijtsrd
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMIJNSA Journal
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkIJSRD
 

Similar to Tree Based Parity Check Scheme Reduces Distortion for Data Hiding (20)

Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 
Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...Stegnography of high embedding efficiency by using an extended matrix encodin...
Stegnography of high embedding efficiency by using an extended matrix encodin...
 
G017444651
G017444651G017444651
G017444651
 
O017429398
O017429398O017429398
O017429398
 
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...Implementation of LSB-Based Image Steganography Method for effectiveness of D...
Implementation of LSB-Based Image Steganography Method for effectiveness of D...
 
Message Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based SteganographyMessage Camouflage in an Image using EDGE-Based Steganography
Message Camouflage in an Image using EDGE-Based Steganography
 
R094108112
R094108112R094108112
R094108112
 
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
 
6119ijcsitce01
6119ijcsitce016119ijcsitce01
6119ijcsitce01
 
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
 
Paper id 25201451
Paper id 25201451Paper id 25201451
Paper id 25201451
 
Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...Reference-free differential histogram-correlative detection of steganography:...
Reference-free differential histogram-correlative detection of steganography:...
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
Improved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB imagesImproved LSB Steganograhy Technique for grayscale and RGB images
Improved LSB Steganograhy Technique for grayscale and RGB images
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
Steganography
SteganographySteganography
Steganography
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 
Hand Written Digit Classification
Hand Written Digit ClassificationHand Written Digit Classification
Hand Written Digit Classification
 
AN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHMAN IMPROVED MULTI-SOM ALGORITHM
AN IMPROVED MULTI-SOM ALGORITHM
 
Efficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural NetworkEfficient And Improved Video Steganography using DCT and Neural Network
Efficient And Improved Video Steganography using DCT and Neural Network
 

Recently uploaded

Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 

Tree Based Parity Check Scheme Reduces Distortion for Data Hiding

  • 1. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 Tree Based Parity Check Scheme for Data Hiding 1 Sampath Kumar Dara, 2 Harshavardhan Awari *1 Assoc. Professor, Department of Electronics and Communication Engineering, Vaageswari College of Engg, Karimnagar, A.P *2 Assoc.Professor, Department of Computer Science Engineering, Vaageswari College of Engg, Karimnagar, A.P. Abstract The information hiding deals with distortion Codes to improve the computational reduction using steganography and security complexity of wet paper codes derive d a hash enhancement using cryptography. Distortion function to efficiently obtain the stego object. reduction is done using Tree Based Parity Check Proposed a scheme called tree-based parity check. which uses Majority vote strategy. The Tree Based Parity Check is very optimal for cloaking a message on image. The proposed majority vote strategy results in least distortion. The SHA-1 algorithm is implemented for security enhancement. The result obtained in proposed method works effectively even with large payload. Key Words— Image coding, information security, Stenography. Fig. 1. Master and toggle strings of a master tree with I. I NTRODUCTION for LSBs 0, 1, 1, 0, 1, 0, 1 o f the cove r object. Stenography studies the scheme to hide secrets into (TBPC) to reduce distortion on a cover object based the communication between the sender and the on a tree structure. receive r such that no other people can detect the existence of the secrets. A steganographic method The embedding efficiency is defined to be consists of an embedding algorithm and an extraction the number of hidden message bits per embedding algorithm. The embedding algorithm describes how t modification. Higher embedding efficiency implies o hide a message into the better undetectability for steganographic methods. cover object and the extraction algorithm illustrates The lower embedding efficiency is defined to be the how to extract the message from the stego object. A ratio of the number of hidden message bits to the commonly used strategy for steganography is to maximum embedding modifications. The lower embed the message by slightly distorting the cove r embedding efficiency is related to undetectability in object into the target stego object. If the distortion is the worst case. It implies steganographic security in sufficiently small, the stego object will be the worst case. indistinguishable from the noisy cove r object. Therefore, reducing distortion is a crucial issue for steganographic methods. In this paper, we propose an II. TBPC METHOD Before embedding and extraction, a location efficient embedding scheme that uses the least finding method determines a sequence of locations number of changes over the tree-based parity check that point to elements in the cover object. The model. embedding algorithm modifies the elements in these locations to hide the message and the extraction The ideas of matrix embedding and defined algorithm can recover the message by inspecting the the codes with the matrix as steganographic codes. same sequence of locations. The TBPC method is a For matrix embedding, finding the stego object with least significant bit (LSB) steganographic method. least distortion is difficult in general. In some special Only the LSBs of the elements pointed by the cases, there exist constructive and fast methods. LT determined locations are used for embedding and Issn 2250-3005(online) September| 2012 Page 1200
  • 2. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 extraction. The TBPC method constructs a complete N-ary tree, called the master tree, to represent the LSBs of the cover object. Then it fills the nodes of the master tree with the LSBs of the cover object level by level, from top to bottom and left to right. Every node of the tree corresponds to an LSB in the cover object. Denote the number of leaves of the master tree by L. The TBPC embedding algorithm derives an L-bit binary string, called the master string, by performing parity check on the master tree from the root to the leaves (e.g., see Fig. 1.). The embedding algorithm hides the message by modifying the bit values of some nodes in the master tree. Assume that the length of the message is also L. Performing the bitwise exclusive-or (XOR) operation between the message and the master string, we obtain a toggle string (e.g., see Fig. 1). Then, the embedding algorithm constructs a new complete N-ary tree, called the toggle tree in the bottom-up order and fills the leaves with the bit values of the toggle string and the other nodes with 0. Then, level by level, from the bottom to the root, each nonleaf node together with its child nodes are flipped if all its child nodes have bits 1 (e.g., see Fig. 2). The embedding algorithm obtains the stego tree by performing XOR between the master tree and the toggle tree (e.g., see Fig. 3). The TBPC extraction algorithm is simple. We can extract the message by performing parity check on Fig. 2. Construction of a toggle tree with for each root-leaf path of the stego tree from left to right. toggle string 0, 1, 1, 1. III. Majority Vote Strategy Two critical issues for a steganographic method are: 1) Reducing distortion on cover objects 2) Better efficiency for embedding and extraction. We give a majority vote strategy on building the toggle tree. It uses the least number of 1’s under the TBPC model. Since the number of 1’s in the toggle tree is the number of modifications on the master tree (i.e., the cover object), the majority vote strategy can produce a stego tree with least distortion on the master tree. The proposed method uses a set of Fig. 3. Modify the master tree into the stego tree by standard measures, to capture image properties before the toggle tree constructed from the toggle string 0, 1, or after the embedding process, which effect the 1, 1. performance of steganalysis techniques. These measures are divided into two categories. First cover First, index all nodes of a complete -ary image properties, and second cover-stego based tree with leave s from top to bottom and left to right. distortion measures. Set the bit toggle string bit by bit into the leave s from left to right and the other nodes 0. Assume that the level of the tree is. Traverse all nonleaf nodes from level 1 to. A nonleaf node and its child nodes form a simple complete subtree. For each simple complete subtree, if the majority of the child nodes hold 1, then flip the bit values of all nodes in this Issn 2250-3005(online) September| 2012 Page 1201
  • 3. International Journal Of Computational Engineering Research (ijceronline.com) Vol. 2 Issue. 5 subtree. Since the construction is bottom-up, the bit References values of the child nodes in every simple complete [1] S. Chang Chun Lu, Shi-Chun Tsai, and Wen- subtree are set after step 3. Note that marking a node Guey Tzeng, ‖ An Optimal Data Hiding at step 4 applies only for being even. When is Scheme With Tree-Based Parity Check‖ in even, after step 3, there may exist a two level simple IEEE Trans. on Image Processing, vol. 20, complete subtree with 1’s in the child nodes and 1 in no. 3, Mar 2011. its root. In this case, flipping the bit values in this [2] J. Fridrich, M. Goljan, and D. Soukal, simple complete subtree results in one fewer node ―Efficient wet paper codes,‖ in Proc. 7th holding 1 and keeps the result of related root-leaf Int. Workshop Information Hiding (IHW 05), path parity check unchanged. Step 4 takes care of this vol. 3727, pp. 204–218, Apr 2005. when the condition applies, and it is done level b y [3] J. Fridrich and D. Soukal, ―Matrix level from top to bottom. Also note that for the root embedding for large payloads,‖ in IEEE of the whole toggle tree, the bit value is always 0 Trans. on Information Forensics and when half of its child nodes hold 1. Thus, after step 4, Security, vol. 1, no. 3, pp. 390–395, Sep. the bit values of the child nodes in each simple 2006. complete subtree are determined. [4] M. Khatirinejad and P. Lisonek, ―Linear codes for high payload steganography,‖ in IV. Experimental Results IEEE Trans. on Discrete Applied To make it clear, we define the percentage of reduced Mathematics, vol. 157, no. 5, pp. 971–981, modifications as follows: 2009. p Reduce = Rt/Dt [5] W. Zhang and X. Wang, ‖Generalization of Where Rt is the reduced number of 1’s in the toggle the ZZW embedding construction for tree and Dt is the number of 1’s in the toggle string. Steganography,‖ in IEEE Trans. on The p Reduce values of both methods are shown in Information Forensics and Security, pp.564- Fig. 4. 569, Jan 2009. [6] J. Fridrich, M. Goljan, P. Lisonek, and D. Soukal, ―Writing on wet paper,‖ in IEEE Trans. on Signal Processing., vol. 53, no. 10, pp. 3923–3935, Oct. 2005. Fig.4. p Toggle comparison of MPC and TBPC. The results show that the MPC method significantly improves previous TBPC results. V. Conclusion By introducing the majority vote strategy, the stego object is constructed with least distortion under the tree structure model. We also show that our method yields a binary linear stego-code and preserves the secrecy of the hidden data. In comparison with the TBPC method, the proposed MPC method significantly reduces the number of modifications on average. Issn 2250-3005(online) September| 2012 Page 1202