SlideShare a Scribd company logo
1 of 3
Rikki Sharma, Priyanka Surve, Mrs. Devyani Bonde / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.1236-1238
1236 | P a g e
STEGO-WATERMARK
Rikki Sharma, Priyanka Surve and Mrs. Devyani Bonde
(Department of Information Technology, Pune University, Pune-47)
(Department of Information Technology, Pune University, Pune-47)
(Department of Information Technology, Pune University, Pune-47)
ABSTRACT
The evolution of the Internet helps the
transmission of digital multi- media content
such as text, audio, images, and video easier.
Digital media can be accessed or distributed
through the network. As the communication
over internet is easier and convenient, the
security becomes main concern. One of the
approaches for secured transmission is
Steganography in which secrete message is
hidden behind the image. For authenticity,
digital watermarking is a technique which
embeds a digital signature or digital watermark
that asserts the ownership or intellectual
property rights of the owner .In this a hybrid
approach is used, in which watermarking and
Steganography techniques have been combined,
which exploits the advantages of both
techniques results in more robustness against
different types of attacks.
Keywords - Robustness, Steganography,
Watermarking.
1. Introduction
To protect and enforce intellectual
property rights of the media owner is an important
issue in the digital world. Digital Watermarking
works by concealing information within digital
data, such that it cannot be detected without special
software with the purpose of making sure the
concealed data is present in all copies of the data
that are made whether legally or otherwise, regard-
less of attempts to damage/remove it. In addition to
it, Steganography is the art and science of writing
hidden messages in such a way that no one, apart
from the sender and intended recipient, suspects the
existence of the message, a form of security
through obscurity. Image Steganography allows for
two parties to communicate secretly and covertly.
Thus an image can be the source of medium to
transfer the secret data from one place to another
and it also refers the ownership rights by using both
these technique. The technique given by Tsung-
Yuan Liu and Wen-Hsiang Tsai[1] uses Visible
watermark. The advantage of this technique is it
gives lossless recovery of image. But being visible
the watermark can be pose threat easily. The
technique used by Satya Prakash Sahu,Satya
Verma [2] of LSB replacement for Steganography
in which data is hidden in the LSB part of the
image and visible watermarking with Opacity
factor in which the watermark remains visible with
the opacity factor which controls the transparency.
But the technique fails to provide security to
hidden data as it is hide in the LSB part, which can
easily affected. Also it uses two keys one for the
Steganography.
The technique used in this paper follows
the approach used in above method [2] but the
algorithm BPCS Steganography(Bit Plane
Complexity)[3] is used for implementing
Steganography and Alpha channeling for
watermarking.
2. Concept
2.1 MESSAGE AND WATERMARK EMBEDDING
1. Carrier image is first loaded. The image
should be in 24 bpp. Secret data is the data
which is to be embedded into the Carrier
Image.
2. The secret data can be encrypted by
applying Key to the encryption process and
then data is embedded into the carrier image.
3. The image obtained by applying BPCS
Steganography algorithm in which carrier
image is divided into 8 by 8 blocks and
secret message is embedded into the
particular block depending upon the
complexity.
4. If user wants to extract some data in
between the process, then he can extract the
same from the Steganographic Image.
5. Watermark is embedded into the
Steganographic Image with the help of alpha
channeling. Alpha channel is an extra 8 bits
added to the 24 bpp Carrier Image which
contains the Author data.
6. Final Stego-Watermark Image is the final
image obtained after applying
Steganography and Watermarking.
7. This image contains the Author data which
is either encrypted or embedded as it is. Also
it contains the Watermark for Tamper
detection to the author data.
Rikki Sharma, Priyanka Surve, Mrs. Devyani Bonde / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.1236-1238
1237 | P a g e
Figure 1: Message And Watermark Embedding
2.2 MESSAGE AND WATERMARK EXTRACTION
1. At the detection stage first extraction of the
watermark from Stego-Watermark image is
done.
2. At verification and analysis phase,
verification of watermark and original
Stego-image is done, to detect the changes
or damages if occurred. Watermark
verification, Alpha channel verification and
verification of Carrier image will be done in
analysis phase.
3. At BPCS De-Steganography stage, BPCS
De-Steganographic algorithm is applied to
the Steganographic Image.
4. Original data is extracted depending upon
the complexity values of the different blocks
of the carrier image.
5. If the data is encrypted, it is decrypted with
the help of specific Key to get the Actual
Data.
Figure 2: Message And Watermark Extraction
3. Proposed System
3.1 BPCS STEGANOGRAPHY
The BPCS Steganography technique
divides the Carrier Image (Image that needs to be
transmitted) into 8 by 8 blocks and there is high
correlation between these blocks. The higher the
block is, the stronger the correlation between the
pixels of the blocks. The complexity of each block
is calculated. The maximum complexity value is
Cmax. The threshold complexity value is set to
aCmax. The block containing the value higher than
the aCmax is replaced by the secret data which is
either encrypted or not.
3.2 ALPHA CHANNEL FOR
WATERMARKING
The alpha channel masking algorithm is
used improve the robustness and protection along
with security. Alpha channel is an additional
channel which contains the information regarding
the image transparency and its various level. It is
an extra 8bit channel other than RGB channels
which controls the transparency. In this
intermediate image data (grayscale component of
the intermediate image) itself as the data to be
watermarked on the intermediate image is used.
This data will helps to determine if there is any
modification or damage done to the original image
and also reconstruct the original image to some
extent.
3.3 BASIC ALGORITHMS
3.3.1 MESSAGE EMBEDDING USING BPCS
1. Divide the carrier image into 8 by 8 blocks
and calculate the complexity.
2. Maximum complexity is calculated.
Rikki Sharma, Priyanka Surve, Mrs. Devyani Bonde / International Journal of Engineering
Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com
Vol. 3, Issue 3, May-Jun 2013, pp.1236-1238
1238 | P a g e
3. Compare calculated complexity with
threshold complexity.
4. The secret data is either encrypted or not
encrypted.
5. Embed the secret data in the block if the
complexity greater than maximum
complexity.
6. If complexity is less than maximum
complexity then conjugate another block to
make it more complex.
7. If conjugate process is involved, make an
entry for the same in conjugate map and
embed it in Carrier image.
3.3.2 MESSAGE EXTRACTION USING BPCS
1. Pick up all the pieces whose complexity
greater than maximum complexity.
2. For confirmation of conjugate blocks pick
up the extra information.
3. Blocks are then decrypted to get the original
message.
4. Conclusion
In this System, the different aspects and
issues of these techniques are focused. The
watermarked Steganographic image is
communicated over the non secure network. By
this approach, not only the secured and authentic
mode of transmission for textual message is
achieved but also the user can detect the changes or
damages done to the watermark and the carrier
image. At last, this technique uses better methods
than previous system for applying Steganography
and Watermarking for providing security to the
user’s data.
REFERENCES
[1] Tsung-Yuan Liu,Wen-Hsiang Tsai
“Generic Lossless Visible Watermarking
(IEEE Journal).”
[2] Satya Prakash Sahu, Satya Verma.
“Computer Networks and Information
Technologies. (Second International
Conference).Year: March 2010-11.”
[3] Pei pei Shi,Tao Zhang “A Technique of
Improved Steganography using BPCS And
Chaos(IEEE Journal 2010).”
[4] ZHANG H L, ZHANG X Y. “A secure
BPCS Steganography against statistical
analysis”. 8th International Conference on
Signal Processing. 2006: 990-992.”
[5] Hioki H.A “data embedding method using
BPCS principle with new complexity
measures”. Pacific Rim Workshop on
Digital Steganography,2002.
[6] Wei, H., Yuan, M., Zhao, J., Kou, Z.
“Research and Realization of Digital
Watermark for Picture Protecting”. In:
First International Workshop on Education
Technology and Computer Science
(2009).

More Related Content

What's hot

IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
AmAl C
 

What's hot (16)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
IRJET- Data Hiding in Digital Image using Steganography
IRJET-  	  Data Hiding in Digital Image using Steganography IRJET-  	  Data Hiding in Digital Image using Steganography
IRJET- Data Hiding in Digital Image using Steganography
 
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...
 
Pso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofingPso based optimized security scheme for image authentication and tamper proofing
Pso based optimized security scheme for image authentication and tamper proofing
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 
A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...A novel hash based least significant bit (2 3-3) image steganography in spati...
A novel hash based least significant bit (2 3-3) image steganography in spati...
 
Two level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automataTwo level data security using steganography and 2 d cellular automata
Two level data security using steganography and 2 d cellular automata
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
 
Audio Steganography java project
Audio Steganography java projectAudio Steganography java project
Audio Steganography java project
 
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
Design and Implementation of Data Hiding Technique by Using MPEG Video with C...
 

Viewers also liked

Peshkash sahih muslim
Peshkash sahih muslimPeshkash sahih muslim
Peshkash sahih muslim
Muhammad Naqi
 

Viewers also liked (20)

G33029037
G33029037G33029037
G33029037
 
Gr3311701176
Gr3311701176Gr3311701176
Gr3311701176
 
Gx3312181223
Gx3312181223Gx3312181223
Gx3312181223
 
Hd3312521256
Hd3312521256Hd3312521256
Hd3312521256
 
Gw3312111217
Gw3312111217Gw3312111217
Gw3312111217
 
Ed33777782
Ed33777782Ed33777782
Ed33777782
 
El33827831
El33827831El33827831
El33827831
 
Ef33787793
Ef33787793Ef33787793
Ef33787793
 
Ev33889894
Ev33889894Ev33889894
Ev33889894
 
Eu33884888
Eu33884888Eu33884888
Eu33884888
 
Eq33857862
Eq33857862Eq33857862
Eq33857862
 
Ea33762765
Ea33762765Ea33762765
Ea33762765
 
Fj3110731078
Fj3110731078Fj3110731078
Fj3110731078
 
Fq3111191124
Fq3111191124Fq3111191124
Fq3111191124
 
Fk3110791084
Fk3110791084Fk3110791084
Fk3110791084
 
He3113871392
He3113871392He3113871392
He3113871392
 
Ak34224227
Ak34224227Ak34224227
Ak34224227
 
Bu34437441
Bu34437441Bu34437441
Bu34437441
 
Y34147151
Y34147151Y34147151
Y34147151
 
Peshkash sahih muslim
Peshkash sahih muslimPeshkash sahih muslim
Peshkash sahih muslim
 

Similar to Ha3312361238

IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD Editor
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
Sreeda Perikamana
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
IJECEIAES
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
Journal For Research
 

Similar to Ha3312361238 (20)

[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
A Survey of Image Steganography
A Survey of Image SteganographyA Survey of Image Steganography
A Survey of Image Steganography
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
A SECURE DATA COMMUNICATION SYSTEM USING CRYPTOGRAPHY AND STEGANOGRAPHY
 
A Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and SteganographyA Secure Data Communication System Using Cryptography and Steganography
A Secure Data Communication System Using Cryptography and Steganography
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...A novel secure image steganography method based on chaos theory in spatial do...
A novel secure image steganography method based on chaos theory in spatial do...
 
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
IRJET-Security Based Data Transfer and Privacy Storage through Watermark Dete...
 
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...An image steganography using improved hyper-chaotic Henon map and fractal Tro...
An image steganography using improved hyper-chaotic Henon map and fractal Tro...
 
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
Fast and Secure Transmission of Image by using Byte Rotation Algorithm in Net...
 
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
Optimized WES-System with Image Bit Embedding for Enhancing the Security of H...
 
Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF Blind Key Steganography Based on Multilevel Wavelet and CSF
Blind Key Steganography Based on Multilevel Wavelet and CSF
 
A Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography TechniquesA Comparative Study And Literature Review Of Image Steganography Techniques
A Comparative Study And Literature Review Of Image Steganography Techniques
 
D010312230
D010312230D010312230
D010312230
 
MESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHYMESSAGE TRANSFER USING STEGANOGRAPHY
MESSAGE TRANSFER USING STEGANOGRAPHY
 
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHYEMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
EMPIRICAL STUDY OF ALGORITHMS AND TECHNIQUES IN VIDEO STEGANOGRAPHY
 

Recently uploaded

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Ha3312361238

  • 1. Rikki Sharma, Priyanka Surve, Mrs. Devyani Bonde / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.1236-1238 1236 | P a g e STEGO-WATERMARK Rikki Sharma, Priyanka Surve and Mrs. Devyani Bonde (Department of Information Technology, Pune University, Pune-47) (Department of Information Technology, Pune University, Pune-47) (Department of Information Technology, Pune University, Pune-47) ABSTRACT The evolution of the Internet helps the transmission of digital multi- media content such as text, audio, images, and video easier. Digital media can be accessed or distributed through the network. As the communication over internet is easier and convenient, the security becomes main concern. One of the approaches for secured transmission is Steganography in which secrete message is hidden behind the image. For authenticity, digital watermarking is a technique which embeds a digital signature or digital watermark that asserts the ownership or intellectual property rights of the owner .In this a hybrid approach is used, in which watermarking and Steganography techniques have been combined, which exploits the advantages of both techniques results in more robustness against different types of attacks. Keywords - Robustness, Steganography, Watermarking. 1. Introduction To protect and enforce intellectual property rights of the media owner is an important issue in the digital world. Digital Watermarking works by concealing information within digital data, such that it cannot be detected without special software with the purpose of making sure the concealed data is present in all copies of the data that are made whether legally or otherwise, regard- less of attempts to damage/remove it. In addition to it, Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Image Steganography allows for two parties to communicate secretly and covertly. Thus an image can be the source of medium to transfer the secret data from one place to another and it also refers the ownership rights by using both these technique. The technique given by Tsung- Yuan Liu and Wen-Hsiang Tsai[1] uses Visible watermark. The advantage of this technique is it gives lossless recovery of image. But being visible the watermark can be pose threat easily. The technique used by Satya Prakash Sahu,Satya Verma [2] of LSB replacement for Steganography in which data is hidden in the LSB part of the image and visible watermarking with Opacity factor in which the watermark remains visible with the opacity factor which controls the transparency. But the technique fails to provide security to hidden data as it is hide in the LSB part, which can easily affected. Also it uses two keys one for the Steganography. The technique used in this paper follows the approach used in above method [2] but the algorithm BPCS Steganography(Bit Plane Complexity)[3] is used for implementing Steganography and Alpha channeling for watermarking. 2. Concept 2.1 MESSAGE AND WATERMARK EMBEDDING 1. Carrier image is first loaded. The image should be in 24 bpp. Secret data is the data which is to be embedded into the Carrier Image. 2. The secret data can be encrypted by applying Key to the encryption process and then data is embedded into the carrier image. 3. The image obtained by applying BPCS Steganography algorithm in which carrier image is divided into 8 by 8 blocks and secret message is embedded into the particular block depending upon the complexity. 4. If user wants to extract some data in between the process, then he can extract the same from the Steganographic Image. 5. Watermark is embedded into the Steganographic Image with the help of alpha channeling. Alpha channel is an extra 8 bits added to the 24 bpp Carrier Image which contains the Author data. 6. Final Stego-Watermark Image is the final image obtained after applying Steganography and Watermarking. 7. This image contains the Author data which is either encrypted or embedded as it is. Also it contains the Watermark for Tamper detection to the author data.
  • 2. Rikki Sharma, Priyanka Surve, Mrs. Devyani Bonde / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.1236-1238 1237 | P a g e Figure 1: Message And Watermark Embedding 2.2 MESSAGE AND WATERMARK EXTRACTION 1. At the detection stage first extraction of the watermark from Stego-Watermark image is done. 2. At verification and analysis phase, verification of watermark and original Stego-image is done, to detect the changes or damages if occurred. Watermark verification, Alpha channel verification and verification of Carrier image will be done in analysis phase. 3. At BPCS De-Steganography stage, BPCS De-Steganographic algorithm is applied to the Steganographic Image. 4. Original data is extracted depending upon the complexity values of the different blocks of the carrier image. 5. If the data is encrypted, it is decrypted with the help of specific Key to get the Actual Data. Figure 2: Message And Watermark Extraction 3. Proposed System 3.1 BPCS STEGANOGRAPHY The BPCS Steganography technique divides the Carrier Image (Image that needs to be transmitted) into 8 by 8 blocks and there is high correlation between these blocks. The higher the block is, the stronger the correlation between the pixels of the blocks. The complexity of each block is calculated. The maximum complexity value is Cmax. The threshold complexity value is set to aCmax. The block containing the value higher than the aCmax is replaced by the secret data which is either encrypted or not. 3.2 ALPHA CHANNEL FOR WATERMARKING The alpha channel masking algorithm is used improve the robustness and protection along with security. Alpha channel is an additional channel which contains the information regarding the image transparency and its various level. It is an extra 8bit channel other than RGB channels which controls the transparency. In this intermediate image data (grayscale component of the intermediate image) itself as the data to be watermarked on the intermediate image is used. This data will helps to determine if there is any modification or damage done to the original image and also reconstruct the original image to some extent. 3.3 BASIC ALGORITHMS 3.3.1 MESSAGE EMBEDDING USING BPCS 1. Divide the carrier image into 8 by 8 blocks and calculate the complexity. 2. Maximum complexity is calculated.
  • 3. Rikki Sharma, Priyanka Surve, Mrs. Devyani Bonde / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 3, Issue 3, May-Jun 2013, pp.1236-1238 1238 | P a g e 3. Compare calculated complexity with threshold complexity. 4. The secret data is either encrypted or not encrypted. 5. Embed the secret data in the block if the complexity greater than maximum complexity. 6. If complexity is less than maximum complexity then conjugate another block to make it more complex. 7. If conjugate process is involved, make an entry for the same in conjugate map and embed it in Carrier image. 3.3.2 MESSAGE EXTRACTION USING BPCS 1. Pick up all the pieces whose complexity greater than maximum complexity. 2. For confirmation of conjugate blocks pick up the extra information. 3. Blocks are then decrypted to get the original message. 4. Conclusion In this System, the different aspects and issues of these techniques are focused. The watermarked Steganographic image is communicated over the non secure network. By this approach, not only the secured and authentic mode of transmission for textual message is achieved but also the user can detect the changes or damages done to the watermark and the carrier image. At last, this technique uses better methods than previous system for applying Steganography and Watermarking for providing security to the user’s data. REFERENCES [1] Tsung-Yuan Liu,Wen-Hsiang Tsai “Generic Lossless Visible Watermarking (IEEE Journal).” [2] Satya Prakash Sahu, Satya Verma. “Computer Networks and Information Technologies. (Second International Conference).Year: March 2010-11.” [3] Pei pei Shi,Tao Zhang “A Technique of Improved Steganography using BPCS And Chaos(IEEE Journal 2010).” [4] ZHANG H L, ZHANG X Y. “A secure BPCS Steganography against statistical analysis”. 8th International Conference on Signal Processing. 2006: 990-992.” [5] Hioki H.A “data embedding method using BPCS principle with new complexity measures”. Pacific Rim Workshop on Digital Steganography,2002. [6] Wei, H., Yuan, M., Zhao, J., Kou, Z. “Research and Realization of Digital Watermark for Picture Protecting”. In: First International Workshop on Education Technology and Computer Science (2009).