SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
DOI : 10.5121/ijnsa.2012.4104 43
Efficient & Secure Data Hiding Using Secret
Reference Matrix
Laxman Tawade1
, Rajshree Mahajan2
, Chandan Kulthe3
1
Department of Electronic and Telecommunication Engineering, Pune University, India
2,3
Aditya Engineering College, Beed, India
tawadelaxman@rediffmail.com
ABSTRACT
Steganography is the science of secret message delivery using cover media. The cover carriers can be
image, video, sound or text data. A digital image is a flexible medium used to carry a secret message
because the slight modification of a cover image is hard to distinguish by human eyes. The proposed
method is inspired from Chang method of Secret Reference Matrix. The data is hidden in 8 bit gray
scale image using 256 X 256 matrix which is constructed by using 4 x 4 table with unrepeated digits from
0~15. The proposed method has high hiding capacity, better stego-image quality, requires little
calculation and is easy to implement.
.
Keywords:
Discrete cosine transformed (DCT), peak-signal-to-noise-ratio (PSNR), secret reference matrix
(SRM)
I. INTRODUCTION
Electronic communication is increasingly susceptible to eavesdropping and malicious
interventions. The issues of security and privacy have traditionally been approached by tools
from cryptography. Although cryptography techniques can be used to encrypt secret messages
for transmission on the internet, the encrypted results can easily arouse attentions of hackers.
Steganography embeds secret messages into a cover media without changing the media’s
perceptual presentation. Thus, when using an image as the cover media, the secret message
carried by the stego-image (cover image with embedded secret data) is visually undistorted and
avoids attracting the hacker’s attention.There are two domains for hiding data in a cover image,
namely, frequency and spatial. In frequency domain, secret data can be embedded into the
discrete cosine transformed (DCT) coefficients. The advantage of frequency domain embedding
is its robustness. When embedding in the DCT’s middle to low frequency coefficients, it is
generally difficult to destroy the embedded secret without drastically changing the outlook of
the cover image. However, the embedding payload is usually lower in the frequency domain in
order to maintain the stego-image’s visual fidelity and robustness of the hidden data. In spatial
domain, the simplest way for embedding is by adjusting the least significant bits (LSBs) of a
pixel value in the cover image. The embedding capacity can be very high in spatial domain (up
to 30~40% of the cover image’s size) and, the embedding and extracting procedure is easy to
implement. However, data embedded directly in the LSBs can be easily detected and extracted
by internet hackers.
Chang et al. [3] proposed a novel data hiding scheme in spatial domain by using
an expansion of Sudoku grid as the map for data embedding and extraction. Chang et al.’s
method maintained the high payload approach (hiding capacity is about 19% of the cover
image’s size) and the hiding security is enhanced compared to traditional LSB substitution
based method. Hong et al.[2] directly improved Chang et al.’s method with the stego-image
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
44
having a higher PSNR (peak-signal-to-noise-ratio). Further, Chin-Chen Chang et. al. [1]
improved Chang et al.’s method and proposed a new spatial domain data hiding scheme by
using a secret reference matrix (SRM) for data embedding and extraction. Both Chang et al. and
Chin-Chen Chang’s methods will be discussed in detail later.
The aim of this paper is to improve the hiding capacity of cover image and increase the
complexity to crack the Secret Reference Matrix (SRM). We proposed a new spatial domain
data hiding scheme by using a secret reference matrix (SRM) for data embedding and extraction
which was inspired from Chin-Chen Chang et. al. [1] Also, the proposed method maintains the
feature of higher security than traditional LSB substitution based data hiding scheme and the
previously proposed method where the secret reference matrix needs to be kept secret between
sender and receiver.
II. RELATED WORKS
Data Hiding Using SRM (Secret Reference Matrix)
In 2009 Chin-Chen Chang et. al. [1] Proposed method in which 256 X 256 matrix is used to
map data to embed in cover image and extraction data from stego image. 256 X 256 matrix is
formed using 3 X 3 matrix which contain 0 ~ 8 unrepeated digit. The 256 X 256 matrix was
constructed because the cover image was only gray scale image. Each pixel value of greyscale is
in between 0 to 256.
In the embedding process first secret data is converted into binary data stream which was
segmented into N groups and converted into 9 base numeral stream S, where S =
{d1,d2,d3,…….,d8}, di ∈ {0,1,...,8}, 1 ≤ i ≤ n and n is the total number of converted secret digits.
For example, a 6-bits binary stream 1011002 would be converted into two 9-base digits
549.Next, given a greyscale cover image I = {Pi | 0 ≤ Pi< 256 <, 0 ≤ i < (H ×W)}, where H and
W represented the height and width of the cover image, respectively. Then, every pair of cover
pixels ( )i i 1P , P+ in I, where i is an even integer, 0 ≤ i < (H ×W), is mapped with M ( )i i 1P , P+
onto RM to locate its value x in the corresponding position in the RM. The proposed method to
embed the secret digit stream S into I can be described in the following steps.
Step 1: Take the next pixel-pair ( )i i 1P , P+ out of I and next secret digit dj out of S.
Step 2: If M( )i i 1P , P+ = dj, let ( )’ ’
i i 1
P , P +
= (pi, pi+1), go to Step 1.
Step 3: Locate the 3×3 table TC for pixel-pair (pi, pi+1).
Step 4: Sequentially search all pixel-pairs in TC
to find the pixel-pair ( )i i 1P, P+ with M
( )i i 1P , P+ = dj (there will be exactly one solution), let ( )’ ’
i i 1
P , P +
=( )i i 1P, P+ , go to Step 1 until
all secret digits in S have been embedded.
After the above embedding process, each pixel-pair ( )i i 1P , P+ in I would find its proper
replacement pixel-pair ( )i i 1P , P+ and the cover image I is converted to the stego image I'. Fig. 1
shows an example to conceal a secret digit 6 into pixel-pair (2, 3). In Fig. 1, since M (2, 3) = 5 ≠
6, a 3×3 searching candidate table TC is located and searched. Pixel pair (3, 3) is the only pixel-
pair in TC to have M (3, 3) = 6. Hence, pixel-pair (2, 3) is changed to (3, 3) to conceal secret
digit 6. The data extraction process of Chang et al.’s method is easy. The data receiver would
need the same 256×256 reference matrix (RM) which can be constructed by using 3 X 3 matrix
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
45
to extract secret stream S from I'. A pixel-pair in I' ( )’ ’
i i 1
P , P +
can be mapped with M( )i i 1P , P+
onto RM to discover a 9-base secret digit dj. The whole secret stream S can then be extracted
when all pairs of pixels in I' were mapped. The extracted S is then converted back to its original
binary format.
Fig. 1: An example of Secret Reference Matrix 256X256 matrix.
Fig. 2: The searching area TC
in SRM for pixel-pair (2, 3).
III. Secure Data Hiding Using Secret Reference Matrix
3.1 Construction of SRM
The proposed method was inspired from Chi-Nan Lin et al.’s method. 256×256 Secret
Reference Matrix (SRM) is constructed to guide the data embedding and extraction process. The
goal is to construct an SRM which can always give a very good replacement pixel-pair
( )’ ’
i i 1
P , P +
for each pixel-pair ( )i i 1P , P+ in the cover image I to conceal secret message S.
Given a 4×4 table T which was filled with 0~15 unrepeated numerical digits.
Step 1: Position table T at column 0, row 0 of an empty 256 X 256 SRM.
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
46
Step 2: Replicate one column at a time horizontally up to 256th
column of 256 X 256 SRM.
Step 3: Replicate one row at a time vertically from 5 th
row up to 256th
row of 256 X 256 SRM.
Fig. 3: An example of T (4 X 4 matrix).
Fig. 4(a): Replicate horizontally.
Fig. 4(b): Replicate vertically.
Fig. 5: An example secret reference matrix (SRM) of dimension 256×256.
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
47
Since SRM is constructed using 4 X 4 matrix. There can be 16! (2092278988800) Different
possible solutions for the SRM which can enhance the data embedding security compared to
traditional simple LSB substitution based methods
3.2 Formation 16 (hexa decimal) base numeral system.
Step 1) Take the secret data from user.
Step 2) Convert it into ASCII format.
Step 3) Convert ASCII to Hexa-decimal.
Eg. Secret data - ‘paraj’
ASCII format – 112 97 114 97 106
Binary Format:
0111000001100001011100100110000101101010
Hexa-decimal Format - ‘706172613A’
3.3 Data Embedding Process
Let I = {Pi | 0 ≤ Pi < 256, 0 ≤ i < (H ×W) } be the gray-scale cover image, where H and W are
the height and width of I, respectively. The binary secret data stream is also transformed into
hexadecimal digit stream S. Let T C
be a 4×4 table in SRM where the centre point in TC
has a
minimum Euclidean distance to a pixel-pair( )i i 1P , P+ in I. The proposed method to embed the
secret digit stream S into I can be described in the following steps.
Step 1: Take the next pixel-pair ( )i i 1P , P+ out of I and next secret digit dj out of S.
Step 2: If M( )i i 1P , P+ = dj , let ( )’ ’
i i 1
P , P +
= ( )i i 1P , P+ , go to Step 1.If dj is greater or equal
than A in hexadecimal format then consider decimal value for locating in TC
. Let digit is dj =
A; then consider dj= 10.
Step 3: Locate the 4×4 table TC
for pixel-pair (Pi, Pi+1).
Step 4: Sequentially search all pixel-pairs in TC
to find the pixel-pair ( )i i 1P, P+ with M
( )i i 1P , P+ =dj (there will be exactly one solution), let ( )’ ’
i i 1
P , P +
= ( )i i 1P , P+ , go to Step 1 until
all secret digits in S have been embedded.
After the above embedding process, each pixel-pair ( )i i 1P , P+ in I would find its proper
replacement pixel-pair ( )’ ’
i i 1
P , P +
and the cover image I is converted to the stego image I'. Fig.
6 show an example to conceal a secret digit C (Hexadecimal) into pixel-pair (3, 4). In Fig. 6,
since M (3, 4) = 12 ≠ 14, a 4×4 searching candidate table TC
is located and searched. Pixel pair
(3, 6) is the only pixel-pair in TC
to have M (3,6) = 14 = C
(Hexadecimal). Hence, pixel-pair (3, 4) is changed to (3, 6) to conceal secret digit C.
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
48
Fig. 6: The searching area TC
in SRM for pixel-pair (3, 4).
3.4 Data Extraction Process
The data extraction process will be exactly the same as in Chang et al.’s method but will use
our newly created SRM as the guiding map for extracting the hexadecimal secret stream S. The
same SRM as in the data embedding process can be constructed by using the same 4 X 4 matrix.
Each pixel-pair ( )’ ’
i i 1
P , P +
in I ' is mapped to the SRM through M( )’ ’
i i 1
P , P +
to get a secret
Hexa-decimal numeral dj. When all hexadecimal digits were recovered, the secret stream S is
then converted back to its original ASCII and then to given text.
IV. EXPERIMENTAL RESULTS
To show the experimental result we have used gray scale images: Lena, Baboon, Charlie,
Colorize as test images. PSNR values are calculated to show the distortion in the stego image.
Comparisons are made with the Chi-Nan Lin etal’s[1] method. PSNR is as defined as follows.
2
10
255
10log ( )PSNR dB
MSE
=
Where
2
1 1
1
( ' )
H W
ij iji j
MSE p p
H W = =
= −
×
∑ ∑ represents the mean square error, H represents
height and W represents the width of the image, ijp and 'ijp are the pixel values of image before
and after the embedding of secret data. A higher PSNR value represents lower distortion of
image. The hiding Capacity C is measured as bits per pixel (bpp) which is calculated as follows:
( )C
B
bpp
H W
=
×
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
49
The Chi-Nan Lin etal’s method used one pixel pair to conceal a 9-base secret digit, the hiding
capacity equals to 1.58 bpp. In proposed method we are hiding 4-bits in one pixel pair so hiding
capacity is 2 bpp. The Stego image quality in terms of PSNR values are shown in table 1.
Average PSNR value of Chi-Nan Lin is 65.90 dB and for proposed method is 64.22 dB.The
proposed method uses reference matrix(4x4) to guide embedding and extraction process.
V. CONCLUSIONS
Experimental results showed that the proposed method achieved higher embedding capacity
(25% of the cover image) than Chi-Nan Lin et al’s method (19 % of the cover image.).Though
hiding capacity is increased there is slight difference in the PSNR values. Average PSNR value
of Chi-Nan Lin is 65.90 dB where as that of proposed method is 64.22 dB. The reference matrix
used (based on 4x4 numbered table) in the experiment has 20922789888000(16!) possible
variances which can improve the security of the secret data. In future, the work can be done on
embedding the 4x4 numbered table itself in the Stego image to achieve higher security.
REFERENCES
[1]. Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee and Jason Lin “A Novel Data Hiding Scheme Using
a Secret Reference Matrix”, 2009 Fifth International Conference on Intelligent Information Hiding and
Multimedia Signal Processing.
[2]. W. Hong, T.S. Chen, and C.W. Shiu, “A Minimal Euclidean Distance Searching Technique for
Sudoku Steganography,” Proceedings of the International Symposium on Information Science and
Engineering (ISISE2008), December 2008.
[3]. C.C. Chang, Y.C. Chou, and T.D. Kieu "An Information Hiding Scheme Using Sudoku," Proceedings
of the Third International Conference on Innovative Computing, Information and Control (ICICIC2008),
Dalian, China, pp. June 2008.
Authors Biography:
Laxman Tawade has pursued BE degree in Electronic & Telecommunication from
Pune University, India in 2011. Currently he is member of International Association
of Computer Science and Information Technology (IACSIT), Academy & industry
research collaboration center (AIRCC) & Affiliate member of signal processing for
communication and networking technical committee. He has 1 paper in international
conference and 4 papers in International Journal to his credit. He has worked as
Reviewer for international journals and international conference sponsored by IEEE
& also worked as program committee member of few international conferences. His
research interest includes Security & Communication Network, Optical Fiber Communication and optical
access networks based on WDM-PON, Biomedical signal processing.
International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012
50
Mahajan Rajshree is currently an Assistant professor in the Department of
Electronic & Telecommunication at Aditya Engineering College, Beed, India. She
is completed first part of M.E. Electronics from Govt. Engg. College, Aurangabad,
MH,India. His teaching experience is 6 years. She has 2 National conference
papers. His research interest includes Robot Arm control via Internet, Low power
VLSI, Security&CommunicationNetwork.
Chandan Kulthe is pursuing BE degree in Electronic & Telecommunication from
Dr.Babasaheb Ambedkar Marathwada University, India. His research interest
includes Security & Communication Network, Optical Fiber Communication and
optical access networks based on WDM-PON.

More Related Content

What's hot

Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
An Effective Method to Hide Texts Using Bit Plane Extraction
An Effective Method to Hide Texts Using Bit Plane ExtractionAn Effective Method to Hide Texts Using Bit Plane Extraction
An Effective Method to Hide Texts Using Bit Plane Extractioniosrjce
 
A Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image SimilarityA Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image SimilarityFarah M. Altufaili
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014ijcsbi
 
Perimetric Complexity of Binary Digital Images
Perimetric Complexity of Binary Digital ImagesPerimetric Complexity of Binary Digital Images
Perimetric Complexity of Binary Digital ImagesRSARANYADEVI
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsTELKOMNIKA JOURNAL
 
Fuzzy c means_realestate_application
Fuzzy c means_realestate_applicationFuzzy c means_realestate_application
Fuzzy c means_realestate_applicationCemal Ardil
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryptiontayseer Karam alshekly
 
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...cscpconf
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
FUAT – A Fuzzy Clustering Analysis Tool
FUAT – A Fuzzy Clustering Analysis ToolFUAT – A Fuzzy Clustering Analysis Tool
FUAT – A Fuzzy Clustering Analysis ToolSelman Bozkır
 
Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...
Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...
Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...wl820609
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksmourya chandra
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsIOSR Journals
 

What's hot (18)

Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
An Effective Method to Hide Texts Using Bit Plane Extraction
An Effective Method to Hide Texts Using Bit Plane ExtractionAn Effective Method to Hide Texts Using Bit Plane Extraction
An Effective Method to Hide Texts Using Bit Plane Extraction
 
A Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image SimilarityA Correlative Information-Theoretic Measure for Image Similarity
A Correlative Information-Theoretic Measure for Image Similarity
 
Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
Perimetric Complexity of Binary Digital Images
Perimetric Complexity of Binary Digital ImagesPerimetric Complexity of Binary Digital Images
Perimetric Complexity of Binary Digital Images
 
A new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systemsA new block cipher for image encryption based on multi chaotic systems
A new block cipher for image encryption based on multi chaotic systems
 
A1804010105
A1804010105A1804010105
A1804010105
 
Verification of Efficacy of Inside-Outside Judgement in Respect of a 3D-Primi...
Verification of Efficacy of Inside-Outside Judgement in Respect of a 3D-Primi...Verification of Efficacy of Inside-Outside Judgement in Respect of a 3D-Primi...
Verification of Efficacy of Inside-Outside Judgement in Respect of a 3D-Primi...
 
Fuzzy c means_realestate_application
Fuzzy c means_realestate_applicationFuzzy c means_realestate_application
Fuzzy c means_realestate_application
 
pre
prepre
pre
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
 
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
Robust Adaptive Threshold Algorithm based on Kernel Fuzzy Clustering on Image...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
FUAT – A Fuzzy Clustering Analysis Tool
FUAT – A Fuzzy Clustering Analysis ToolFUAT – A Fuzzy Clustering Analysis Tool
FUAT – A Fuzzy Clustering Analysis Tool
 
Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...
Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...
Dimension Reduction And Visualization Of Large High Dimensional Data Via Inte...
 
Fuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networksFuzzy c means clustering protocol for wireless sensor networks
Fuzzy c means clustering protocol for wireless sensor networks
 
Pca ankita dubey
Pca ankita dubeyPca ankita dubey
Pca ankita dubey
 
Efficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixelsEfficient Technique for Image Stenography Based on coordinates of pixels
Efficient Technique for Image Stenography Based on coordinates of pixels
 

Similar to Efficient & Secure Data Hiding Using Secret Reference Matrix

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
Az2419511954
Az2419511954Az2419511954
Az2419511954IJMER
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...cscpconf
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryptionnooriasukmaningtyas
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domainijistjournal
 
Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption ijcisjournal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Editor IJARCET
 
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...cscpconf
 
Ax31139148
Ax31139148Ax31139148
Ax31139148IJMER
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption usingcsandit
 

Similar to Efficient & Secure Data Hiding Using Secret Reference Matrix (20)

International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Is3314841490
Is3314841490Is3314841490
Is3314841490
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
Az2419511954
Az2419511954Az2419511954
Az2419511954
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
 
Secure image hiding in speech signal by steganography-mining and encryption
Secure image hiding in speech signal by steganography-mining  and encryptionSecure image hiding in speech signal by steganography-mining  and encryption
Secure image hiding in speech signal by steganography-mining and encryption
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial DomainColour Image Steganography Based on Pixel Value Differencing in Spatial Domain
Colour Image Steganography Based on Pixel Value Differencing in Spatial Domain
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption Performance Analysis of CRT for Image Encryption
Performance Analysis of CRT for Image Encryption
 
T01022103108
T01022103108T01022103108
T01022103108
 
Paper_KST
Paper_KSTPaper_KST
Paper_KST
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229Ijarcet vol-2-issue-7-2223-2229
Ijarcet vol-2-issue-7-2223-2229
 
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
EXTENDED WAVELET TRANSFORM BASED IMAGE INPAINTING ALGORITHM FOR NATURAL SCENE...
 
Ax31139148
Ax31139148Ax31139148
Ax31139148
 
Ijcatr04041020
Ijcatr04041020Ijcatr04041020
Ijcatr04041020
 
Selective image encryption using
Selective image encryption usingSelective image encryption using
Selective image encryption using
 

Recently uploaded

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

Efficient & Secure Data Hiding Using Secret Reference Matrix

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012 DOI : 10.5121/ijnsa.2012.4104 43 Efficient & Secure Data Hiding Using Secret Reference Matrix Laxman Tawade1 , Rajshree Mahajan2 , Chandan Kulthe3 1 Department of Electronic and Telecommunication Engineering, Pune University, India 2,3 Aditya Engineering College, Beed, India tawadelaxman@rediffmail.com ABSTRACT Steganography is the science of secret message delivery using cover media. The cover carriers can be image, video, sound or text data. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. The proposed method is inspired from Chang method of Secret Reference Matrix. The data is hidden in 8 bit gray scale image using 256 X 256 matrix which is constructed by using 4 x 4 table with unrepeated digits from 0~15. The proposed method has high hiding capacity, better stego-image quality, requires little calculation and is easy to implement. . Keywords: Discrete cosine transformed (DCT), peak-signal-to-noise-ratio (PSNR), secret reference matrix (SRM) I. INTRODUCTION Electronic communication is increasingly susceptible to eavesdropping and malicious interventions. The issues of security and privacy have traditionally been approached by tools from cryptography. Although cryptography techniques can be used to encrypt secret messages for transmission on the internet, the encrypted results can easily arouse attentions of hackers. Steganography embeds secret messages into a cover media without changing the media’s perceptual presentation. Thus, when using an image as the cover media, the secret message carried by the stego-image (cover image with embedded secret data) is visually undistorted and avoids attracting the hacker’s attention.There are two domains for hiding data in a cover image, namely, frequency and spatial. In frequency domain, secret data can be embedded into the discrete cosine transformed (DCT) coefficients. The advantage of frequency domain embedding is its robustness. When embedding in the DCT’s middle to low frequency coefficients, it is generally difficult to destroy the embedded secret without drastically changing the outlook of the cover image. However, the embedding payload is usually lower in the frequency domain in order to maintain the stego-image’s visual fidelity and robustness of the hidden data. In spatial domain, the simplest way for embedding is by adjusting the least significant bits (LSBs) of a pixel value in the cover image. The embedding capacity can be very high in spatial domain (up to 30~40% of the cover image’s size) and, the embedding and extracting procedure is easy to implement. However, data embedded directly in the LSBs can be easily detected and extracted by internet hackers. Chang et al. [3] proposed a novel data hiding scheme in spatial domain by using an expansion of Sudoku grid as the map for data embedding and extraction. Chang et al.’s method maintained the high payload approach (hiding capacity is about 19% of the cover image’s size) and the hiding security is enhanced compared to traditional LSB substitution based method. Hong et al.[2] directly improved Chang et al.’s method with the stego-image
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012 44 having a higher PSNR (peak-signal-to-noise-ratio). Further, Chin-Chen Chang et. al. [1] improved Chang et al.’s method and proposed a new spatial domain data hiding scheme by using a secret reference matrix (SRM) for data embedding and extraction. Both Chang et al. and Chin-Chen Chang’s methods will be discussed in detail later. The aim of this paper is to improve the hiding capacity of cover image and increase the complexity to crack the Secret Reference Matrix (SRM). We proposed a new spatial domain data hiding scheme by using a secret reference matrix (SRM) for data embedding and extraction which was inspired from Chin-Chen Chang et. al. [1] Also, the proposed method maintains the feature of higher security than traditional LSB substitution based data hiding scheme and the previously proposed method where the secret reference matrix needs to be kept secret between sender and receiver. II. RELATED WORKS Data Hiding Using SRM (Secret Reference Matrix) In 2009 Chin-Chen Chang et. al. [1] Proposed method in which 256 X 256 matrix is used to map data to embed in cover image and extraction data from stego image. 256 X 256 matrix is formed using 3 X 3 matrix which contain 0 ~ 8 unrepeated digit. The 256 X 256 matrix was constructed because the cover image was only gray scale image. Each pixel value of greyscale is in between 0 to 256. In the embedding process first secret data is converted into binary data stream which was segmented into N groups and converted into 9 base numeral stream S, where S = {d1,d2,d3,…….,d8}, di ∈ {0,1,...,8}, 1 ≤ i ≤ n and n is the total number of converted secret digits. For example, a 6-bits binary stream 1011002 would be converted into two 9-base digits 549.Next, given a greyscale cover image I = {Pi | 0 ≤ Pi< 256 <, 0 ≤ i < (H ×W)}, where H and W represented the height and width of the cover image, respectively. Then, every pair of cover pixels ( )i i 1P , P+ in I, where i is an even integer, 0 ≤ i < (H ×W), is mapped with M ( )i i 1P , P+ onto RM to locate its value x in the corresponding position in the RM. The proposed method to embed the secret digit stream S into I can be described in the following steps. Step 1: Take the next pixel-pair ( )i i 1P , P+ out of I and next secret digit dj out of S. Step 2: If M( )i i 1P , P+ = dj, let ( )’ ’ i i 1 P , P + = (pi, pi+1), go to Step 1. Step 3: Locate the 3×3 table TC for pixel-pair (pi, pi+1). Step 4: Sequentially search all pixel-pairs in TC to find the pixel-pair ( )i i 1P, P+ with M ( )i i 1P , P+ = dj (there will be exactly one solution), let ( )’ ’ i i 1 P , P + =( )i i 1P, P+ , go to Step 1 until all secret digits in S have been embedded. After the above embedding process, each pixel-pair ( )i i 1P , P+ in I would find its proper replacement pixel-pair ( )i i 1P , P+ and the cover image I is converted to the stego image I'. Fig. 1 shows an example to conceal a secret digit 6 into pixel-pair (2, 3). In Fig. 1, since M (2, 3) = 5 ≠ 6, a 3×3 searching candidate table TC is located and searched. Pixel pair (3, 3) is the only pixel- pair in TC to have M (3, 3) = 6. Hence, pixel-pair (2, 3) is changed to (3, 3) to conceal secret digit 6. The data extraction process of Chang et al.’s method is easy. The data receiver would need the same 256×256 reference matrix (RM) which can be constructed by using 3 X 3 matrix
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012 45 to extract secret stream S from I'. A pixel-pair in I' ( )’ ’ i i 1 P , P + can be mapped with M( )i i 1P , P+ onto RM to discover a 9-base secret digit dj. The whole secret stream S can then be extracted when all pairs of pixels in I' were mapped. The extracted S is then converted back to its original binary format. Fig. 1: An example of Secret Reference Matrix 256X256 matrix. Fig. 2: The searching area TC in SRM for pixel-pair (2, 3). III. Secure Data Hiding Using Secret Reference Matrix 3.1 Construction of SRM The proposed method was inspired from Chi-Nan Lin et al.’s method. 256×256 Secret Reference Matrix (SRM) is constructed to guide the data embedding and extraction process. The goal is to construct an SRM which can always give a very good replacement pixel-pair ( )’ ’ i i 1 P , P + for each pixel-pair ( )i i 1P , P+ in the cover image I to conceal secret message S. Given a 4×4 table T which was filled with 0~15 unrepeated numerical digits. Step 1: Position table T at column 0, row 0 of an empty 256 X 256 SRM.
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012 46 Step 2: Replicate one column at a time horizontally up to 256th column of 256 X 256 SRM. Step 3: Replicate one row at a time vertically from 5 th row up to 256th row of 256 X 256 SRM. Fig. 3: An example of T (4 X 4 matrix). Fig. 4(a): Replicate horizontally. Fig. 4(b): Replicate vertically. Fig. 5: An example secret reference matrix (SRM) of dimension 256×256.
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012 47 Since SRM is constructed using 4 X 4 matrix. There can be 16! (2092278988800) Different possible solutions for the SRM which can enhance the data embedding security compared to traditional simple LSB substitution based methods 3.2 Formation 16 (hexa decimal) base numeral system. Step 1) Take the secret data from user. Step 2) Convert it into ASCII format. Step 3) Convert ASCII to Hexa-decimal. Eg. Secret data - ‘paraj’ ASCII format – 112 97 114 97 106 Binary Format: 0111000001100001011100100110000101101010 Hexa-decimal Format - ‘706172613A’ 3.3 Data Embedding Process Let I = {Pi | 0 ≤ Pi < 256, 0 ≤ i < (H ×W) } be the gray-scale cover image, where H and W are the height and width of I, respectively. The binary secret data stream is also transformed into hexadecimal digit stream S. Let T C be a 4×4 table in SRM where the centre point in TC has a minimum Euclidean distance to a pixel-pair( )i i 1P , P+ in I. The proposed method to embed the secret digit stream S into I can be described in the following steps. Step 1: Take the next pixel-pair ( )i i 1P , P+ out of I and next secret digit dj out of S. Step 2: If M( )i i 1P , P+ = dj , let ( )’ ’ i i 1 P , P + = ( )i i 1P , P+ , go to Step 1.If dj is greater or equal than A in hexadecimal format then consider decimal value for locating in TC . Let digit is dj = A; then consider dj= 10. Step 3: Locate the 4×4 table TC for pixel-pair (Pi, Pi+1). Step 4: Sequentially search all pixel-pairs in TC to find the pixel-pair ( )i i 1P, P+ with M ( )i i 1P , P+ =dj (there will be exactly one solution), let ( )’ ’ i i 1 P , P + = ( )i i 1P , P+ , go to Step 1 until all secret digits in S have been embedded. After the above embedding process, each pixel-pair ( )i i 1P , P+ in I would find its proper replacement pixel-pair ( )’ ’ i i 1 P , P + and the cover image I is converted to the stego image I'. Fig. 6 show an example to conceal a secret digit C (Hexadecimal) into pixel-pair (3, 4). In Fig. 6, since M (3, 4) = 12 ≠ 14, a 4×4 searching candidate table TC is located and searched. Pixel pair (3, 6) is the only pixel-pair in TC to have M (3,6) = 14 = C (Hexadecimal). Hence, pixel-pair (3, 4) is changed to (3, 6) to conceal secret digit C.
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012 48 Fig. 6: The searching area TC in SRM for pixel-pair (3, 4). 3.4 Data Extraction Process The data extraction process will be exactly the same as in Chang et al.’s method but will use our newly created SRM as the guiding map for extracting the hexadecimal secret stream S. The same SRM as in the data embedding process can be constructed by using the same 4 X 4 matrix. Each pixel-pair ( )’ ’ i i 1 P , P + in I ' is mapped to the SRM through M( )’ ’ i i 1 P , P + to get a secret Hexa-decimal numeral dj. When all hexadecimal digits were recovered, the secret stream S is then converted back to its original ASCII and then to given text. IV. EXPERIMENTAL RESULTS To show the experimental result we have used gray scale images: Lena, Baboon, Charlie, Colorize as test images. PSNR values are calculated to show the distortion in the stego image. Comparisons are made with the Chi-Nan Lin etal’s[1] method. PSNR is as defined as follows. 2 10 255 10log ( )PSNR dB MSE = Where 2 1 1 1 ( ' ) H W ij iji j MSE p p H W = = = − × ∑ ∑ represents the mean square error, H represents height and W represents the width of the image, ijp and 'ijp are the pixel values of image before and after the embedding of secret data. A higher PSNR value represents lower distortion of image. The hiding Capacity C is measured as bits per pixel (bpp) which is calculated as follows: ( )C B bpp H W = ×
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012 49 The Chi-Nan Lin etal’s method used one pixel pair to conceal a 9-base secret digit, the hiding capacity equals to 1.58 bpp. In proposed method we are hiding 4-bits in one pixel pair so hiding capacity is 2 bpp. The Stego image quality in terms of PSNR values are shown in table 1. Average PSNR value of Chi-Nan Lin is 65.90 dB and for proposed method is 64.22 dB.The proposed method uses reference matrix(4x4) to guide embedding and extraction process. V. CONCLUSIONS Experimental results showed that the proposed method achieved higher embedding capacity (25% of the cover image) than Chi-Nan Lin et al’s method (19 % of the cover image.).Though hiding capacity is increased there is slight difference in the PSNR values. Average PSNR value of Chi-Nan Lin is 65.90 dB where as that of proposed method is 64.22 dB. The reference matrix used (based on 4x4 numbered table) in the experiment has 20922789888000(16!) possible variances which can improve the security of the secret data. In future, the work can be done on embedding the 4x4 numbered table itself in the Stego image to achieve higher security. REFERENCES [1]. Chi-Nan Lin, Chin-Chen Chang, Wei-Bin Lee and Jason Lin “A Novel Data Hiding Scheme Using a Secret Reference Matrix”, 2009 Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. [2]. W. Hong, T.S. Chen, and C.W. Shiu, “A Minimal Euclidean Distance Searching Technique for Sudoku Steganography,” Proceedings of the International Symposium on Information Science and Engineering (ISISE2008), December 2008. [3]. C.C. Chang, Y.C. Chou, and T.D. Kieu "An Information Hiding Scheme Using Sudoku," Proceedings of the Third International Conference on Innovative Computing, Information and Control (ICICIC2008), Dalian, China, pp. June 2008. Authors Biography: Laxman Tawade has pursued BE degree in Electronic & Telecommunication from Pune University, India in 2011. Currently he is member of International Association of Computer Science and Information Technology (IACSIT), Academy & industry research collaboration center (AIRCC) & Affiliate member of signal processing for communication and networking technical committee. He has 1 paper in international conference and 4 papers in International Journal to his credit. He has worked as Reviewer for international journals and international conference sponsored by IEEE & also worked as program committee member of few international conferences. His research interest includes Security & Communication Network, Optical Fiber Communication and optical access networks based on WDM-PON, Biomedical signal processing.
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.1, January 2012 50 Mahajan Rajshree is currently an Assistant professor in the Department of Electronic & Telecommunication at Aditya Engineering College, Beed, India. She is completed first part of M.E. Electronics from Govt. Engg. College, Aurangabad, MH,India. His teaching experience is 6 years. She has 2 National conference papers. His research interest includes Robot Arm control via Internet, Low power VLSI, Security&CommunicationNetwork. Chandan Kulthe is pursuing BE degree in Electronic & Telecommunication from Dr.Babasaheb Ambedkar Marathwada University, India. His research interest includes Security & Communication Network, Optical Fiber Communication and optical access networks based on WDM-PON.