SlideShare a Scribd company logo
1 of 17
Download to read offline
International Journal of ElectronicsJOURNAL OF ELECTRONICS AND
INTERNATIONAL and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 5, Issue 1, January (2014), pp. 26-42
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2013): 5.8896 (Calculated by GISI)
www.jifactor.com

IJECET
©IAEME

HIGH CAPACITY STEGANOGRAPHY BASED ON CHAOS AND
CONTOURLET TRANSFORM FOR HIDING MULTIMEDIA DATA
Eng. Zaynab Najeeb Abdulhameed(1),

Prof. Maher K. Mahmood(2)

(1)

University of Al –Anbar, College Of Dentistry, Iraq
University of Al – Mustansiriya, College of Engineering, Electrical Engineering Department, Iraq

(2)

ABSTRACT
In the last years the subject of hiding information has been effective, and steganography is
one of the most important subdisciplines. Many of the algorithms appeared to work on developing
efficient techniques of practical steganography. Steganography is the science that deals with hiding
of secret data in some carrier media which may be image, audio, formatted text or video. The main
idea behind this is to conceal the very existence of data. We deal here with image steganography.
This work presents techniques of image steganography (Blind and non-Blind) based on chaotic
system and Contourlet Transform, the chaotic system is used due to many properties; first of all
using a Modified Arnold Cat Map( MACM ) to increase the key space which makes it very difficult
to extract the secret message by the enemy. In this method, embedding is done in Contourlet domain
that provides large embedding capacity, after that the correct location of embedding would be
selected carefully to decrease the distortion on the cover image to avoid the detection of this process.
Experiments and comparative studies showed the effectiveness of the proposed technique in
generating stego images. In addition, its superiority is shown by comparison with a similar waveletbased steganography approach. The measurement of the quality of the stego image was depended on
the PSNR, SNR and Correlation for measuring the similarity between the cover image and the stego
image .
KEYWORDS: Steganography, Blind and non-Blind, Contourlet Transform, Modified Arnold cat
Map.
1- INTRODUCTION
Steganography is an ancient art that has been reborn in recent years. The word Steganography
comes from Greek roots which literally means "covered writing', and is usually interpreted to mean
hiding information in between other information [1]. Steganography is a very old method of passing
messages in secret. This method of message cloaking goes back to the time of the ancient Greeks.
26
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

During the WWII World War II spies on both sides used "invisible ink"[2]. The most important
requirement for a steganographic algorithm is: capacity, security, and robustness [3].
-Capacity. refers to the amount of information that a data hiding scheme can successfully embed
without a noticeable distortion in the marked media.
-Security. The embedding algorithm is said to be secure if the embedded information cannot be
removed beyond reliable detection by targeted attacks based on a full knowledge of the embedding
algorithm and to detector.
-Robustness. The embedded information is said to be robust if its presence can be reliably detected
after the image has been modified but not destroyed beyond recognition.
Steganographic methods can be broadly classified based on the embedding domain, digital
steganography techniques are classified into (i) spatial domain (ii) frequency domain. In spatial
domain method, the secret message is directly embedded into the host image by changing its pixel
value. Transform domain tries to encode message bits in the transform domain coefficients of the
image. Transformed are more robust compared to spatial domain ones. Transform domain techniques
includes Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet
Transform (DWT) etc. DWT is broadly used for digital steganography since it has better
performance than other transform domain techniques. DWT is a multiresolution and time frequency
representation. It captures only the discontinuities at edge points of the image in three directions at
each resolution and lacks in capturing smoothness along the contours. This problem has been solved
by the Contourlet Transform (CT).
Chaos is aperiodic long–term behavior in a deterministic System, . The field was pioneered by
Lorenz (1963), chaos mathematically is defined as ‘randomness’ generated by simple deterministic
systems, This randomness is a result of the sensitivity of chaotic systems to the initial
conditions[4].A chaotic map is a map that exhibits some sort of chaotic behavior used to increase the
security. The most attractive feature of chaos in information hiding area is its extreme sensitivity to
initial conditions.
There are many researches in each of the steganography techniques ,and a brief description
of some of these research are presented :For the researches which are presented the high capacity
steganography methods are [5-7],For the researches which are presented the chaos based
steganography methods are [8-10] , and for the researches presented the steganography based on
contourlet transform are [11-13].
This work implemented both types: blind system which means that the receiver does not need
the original cover image to extract the information hiding, and non blind which means the original
cover image was needed to compare and extract the secret information. In all of these algorithms, the
cover was decomposed into many levels using contourlet transform(CT)and calculating the energy of
the subbands to hide the information in the subbands that have less energy in order to decrease the
distorting effect in the cover image, then we embedded the secret information using chaotic map
which was used to shuffle the secret information overall the cover image.
2. PROPOSED APPROACH
2.1 CHAOTIC MAP
A chaotic map is a map that exhibits some sort of chaotic behavior. Maps may be
parameterized by a discrete-time or a continuous-time parameter. Discrete maps usually take the
form of iterated functions [4]. By a deterministic map, we mean an evolution equation specified by a
function f :M M mapping some space M to itself, which gives rise to a time series {x(i)} satisfying
the relation. x(n + 1) = f(x(n)) =f ୬ (x(0)).The action of the map on the unit square is often explained
27
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

with a picture of a cat, which gave the map its name. The mathematical formula is [14]: C(x; y) =
(x+y mod 1, x+ 2y mod 1)
=(

1 1 x
) ( ) mod 1
1 2 y

(1)

where "a" mod 1 .means the fractional part of "a" for any real "a". Denoting the square 2×2 matrix
as A .|A |is equal to 1. Equation (1) is one-to-one, each point of the unit square is uniquely mapped
into another point in the unit square. The Lyapunov exponents of the Arnold cat map are calculated
by finding the eigenvectors of the matrix in eq. (1) [16] were: λ1 ൌ
, λ2 ൌ
, we see that λ1
2
2
>1 and λ2 < 1 , Hence, the Lyapunov exponents of eq. (1) are ι1=ln(λ1) ,ι2=ln(λ2).It is clear that one
of the Lyapunov exponents, i.e., λ1, is positive
It can be easily seen that the original Arnold transformations given by equation (1) can be
modified to produce a sequence of Arnold transformations ,and One way to generalize the above 2-D
Arnold cat map can be achieved by introducing new parameters(a1,b1,c1) to increase and ensure high
security implementation a as follows [14],assume that we have an N × N image P. Arnold cat map is
given as follows:
3ା√5

1
x′
( ) =൤
y′
aଵ

x
bଵ ൅ cଵ ଶ
ଶ ൨ (y) (mod N)
1 ൅ aଵ bଵ ൅ aଵ cଵ

3ି√5

(2)

where a1,b1 and c1 are positive control parameters ‫ א‬R , (x' , y') are the coordinate values of the
shuffled pixel.One can easily notice that ,|A |is equal to 1, which means that eq. (2) is one-to-one.
Furthermore to find the LE of this matrix first we must find the eigenvalues of A .
λ1 ൌ

మ

2ାୟభ ୠభ ାୟభ ୡభ 2 ାට൫2ାୟభ ୠభାୟభ ୡభ 2 ൯ ିସ
2

and λ2 ൌ

మ

2ାୟభ ୠభ ାୟభ ୡభ 2 ିට൫2ାୟభ ୠభ ାୟభ ୡభ 2 ൯ ିସ
2

,

i.e. ι1=ln(λ1) ,ι2=ln(λ2), we see that λ1 >1 and λ2 < 1 when we choose (a1, b1 , c1) > 0 and (a1, b1 ,
c1) ‫ א‬R , one of the Lyapunov exponents is positive, so we use these parameters as control to
increase the security.
2.2 THE CONTOURLET TRANSFORM
The limitations of commonly used separable extensions of one-dimensional transforms, such
as the Fourier and wavelet transforms, in capturing the geometry of image edges are well known,
contourlet transform “true” two-dimensional transform that can capture the intrinsic geometrical
structure that is key in visual information. A discrete-domain multiresolution and multidirection
expansion using nonseparable filter banks, in much the same way that wavelets were derived from
filter banks. This construction results in a flexible multiresolution , local, and directional image
expansion using contour segments, and thus it is named the contourlet transform [15].
Do and Vetterli developed the contourlet transform based on an efficient two-dimensional
multiscale and directional filter bank that can deal effectively with images having smooth contours.
The contourlet transform uses iterated filter banks, which makes it computationally efficient;
specifically, it requires O(N) operations for an N-pixel image [16].
The contourlet transform has all of these properties while the wavelet transform provided
only the first three [15]:
1) Multiresolution. 2) Localization. 3) Critical sampling. 4) Directionality. 5) Anisotropy.
28
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

2.2.2 THE CONSTRUCTION OF THE CONTOURLET TRANSFORM

Figure (1) An illustration of Contourlet Transform
Figure(1) shows the construction of the contourlet transform.The contourlet transform is a
combination of two transforms namely:
1) The Laplacian Pyramid (LP) with special filters and reconstruction scheme .For dividing the
image into a low pass and a high pass subband.
2) A two dimensional directional filter bank for splitting the high pass subband into different spatial
frequency orientations. The combined properties of these transforms provide us with the desired
properties of a multi directional transform for digital images , and by successively applying the
transform on the low pass image, we also achieve a multiresolution representation[16]. Figure (2)
depicts this decomposition process, whereH and G are called (lowpass) analysis and synthesis filters,
respectively, and M is the up or down sampling matrix. The process can be iterated on the coarse
(downsampled lowpass) signal[15].
a
x

p

b

Figure(2) Laplacian pyramid (one level LP decomposition).
Where x : the original image, a : coarse approximation, b: the difference between the original
x and prediction image p. For one level LP decomposition ,the Laplacian pyramid generates a down
sampled low pass version of the original and the difference between the original "x" and the
prediction "p", resulting in a bandpass image "b" (prediction error) see figure(2) [17].
By repeating these steps several times a sequence of images are obtained. If these images are
stacked one above other ,the result is a tapering pyramid data structure as shown in figure(3).
w2
Level 2

(5, 5)

Level 1
w1
Level 0
(−5,−5 )

Figure( 3) Laplacian pyramid
Figure (4) Directional filter bank frequency
partitioning L= 3 and there are 23 = 8 real wedge-shaped frequency bands
29
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

A 2-D directional filter bank (DFB) that can be maximally decimated while achieving perfect
reconstruction. The DFB is efficiently implemented via a L-level tree-structured decomposition that
leads to 2L subbands with wedge-shaped frequency partition as shown in figure(4)[16].
2.3 IMPLEMENTATION OF THE PROPOSED SYSTEM
This work includes hiding image in an image and hiding text in an image. In these algorithms
we have expressed interest to the quality of the extracted secret information besides the quality of the
stego image, compared with the original cover.
2.3.1 THE TRANSMITTER SIDE
All of the algorithms are implemented in both types: blind and non blind system. In all of
these algorithms, the transmitter analyses the cover (digital image) into many levels using
contourlet transform CT(decomposition) and calculating the energy of the subbands to hide the
information in the subbands that have less energy in order to decrease the distorting effect in the
cover image, then we embed the secret information using chaotic map(Arnold cat map) which was
used to shuffle the secret information overall the cover image ,after that doing the reconstruction is
performed by (ICT) to get the transmitter stego-image as shown in figure(5).
Cover image

Contourlet decomposition

Finding subband energy

Secret message

Embedding process (shuffling information in the cover by ACM)

Contourlet reconstruction

Stego image

Figure(5) The main block diagram at the transmitter side
First in these systems the cover image should be selected carefully like choosing the cover
with low details so when the high frequency is replaced with another information, the cover image
was decomposed by contourlet transform(CT). In this transform the first subband is the low pass
region as a result of applying Laplacian Pyramids(LP) which divides the image into a low pass and
high pass subband and if this step is repeated several times this leads to get multilevel of splitting of
the lowpass ,then the directional filter bank (DFB) is used to split the high pass subband .The DFB is
efficiently implemented via an m-level binary tree decomposition that leads to 2m frequency
partitioning, To explain these steps let us represent it by the sequence :
[L]=ൣℓଵ , ℓଶ , ℓଷ , ℓସ , … . . ℓ୫ ൧

Where m: no. of level, and ℓ୧ =number of directions of the ith level , up to 2^ℓ୫ number
of subbands . The dimension of the cover should be power of two (2n), where n:is an integer .
- If [L]=[1,2,3,4] ,the first level has 21=2 subbands, the second level has 22=4subbands ,the third
level has 23=8 subbands, and the fourth level has 24=16 subbands as shown in fig.(6) where the
dimension of the low pass subband is (32×32) only and all of the others are high frequency, the
dimension of the high frequency subband for the first level is (32×64) for both of the subband, for
the second level is (64×64) for all of the subbands, for the the third level is (64×128) for all of the
subbands, and for the the fourth level is (64×256) for all of the subbands , adding together for all
levels ,then we have: 32*32+(2*32*64)+(4*64*64)+(8*64*128)+(16*64*256)=349,184 coefficients
30
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

Figure(6) 4-level Contourlet decomposition
Now to embed the information inside the cover image( say lena with size of 512*512). In
this work 4-level decomposition of contourlet transform is used as shown in figure (6).The
embedding operation would be at the last level .The number of directions in the last level will be
determined depending on the size of the information that want to be embedded in the highpass
subband , after that depending on the energy of the subbands the position of the secret information
will be determined .To calculate the energy of the contourlet coefficients, equation(3) will be used :
E =∑i ∑j │sሺi, jሻଶ │

…….(3)

Where 0 ≤( i , j) ≤ N , s(i,j):the value of the contourlet coefficient .
Then by aapplying Modified Arnold Cat Map(MACM) to an image the result becomes
imperceptible or noisy ,where( a1 ,b1 and c1 ) are positive control parameters as a secret key between
31
International Journal of Electronics and Communication Engineering & Technology (IJECET),
Engineering
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

the sender and recipient . This operation will be used inside the embedding process to shuffle the
secret information overall the intended subband. Let's consider a (4×4)block , then if (MACM) is
subband
applied on its pixels then new positions of each pixel as in figure(7).
1 2 3 4
5 6 7 8
9 10 11 12
13 14 15 16

16 2 8 10
9 15 1 7
6 12 14 4
3 5 11 13

Figure (7) Applying MACM to (4×4)block and(a1=2,b1=3,c1=4)
(4×4
2.3.1.1 EMBEDDING ALGORITHMS
2.3.1.1A HIDING IMAGE IN IMAGE
The steps for this algorithms as shown in figure(8) are:
fig
1- After preparation of the cover image(C)
eparation
2- Convert the secret image into vector(1-dimension)(SV1-blind)&(SV2-non-blind).
vector(1
blind).
3- Multiply by a factor SV1'= SV1*α and SV2'=SV2* α.
4- Generate modified MACM.
5- If the system is blind then replace the value of coefficient S(i,j) by the value of SV1',else adding
the value of SV2' to the original value of the coefficient in case the system is non-blind.
th
blind.
6- Reconstruct by(ICT)to give the stego Image
Image.

Input the cover image

Input The hidden image

Convert to 1-vector SV1 for
blind system

4-level Contourlet
transform transform

Decomposed by CT and Convert
to 1-vector SV2 for blind system

SV1'=SV1*α for blind or SV2'=SV2* α if non-blind
blind
Choose the suitable subband

Permutation process by using CAT map to find the
new location and S(i,j)=SV' if blind system
S(i,j)=S(i,j)+SV' if non-blind system
non

Inverse contourlet transform

Stego image

Figure (8): Block diagram of Hiding image in image
:

32
International Journal of Electronics and Communication Engineering & Technology (IJECET),
Engineering
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

2.3.1.1 b: HIDING TEXT IN IMAGE
The steps for this algorithms as shown in figure(9) are:
fig
1- After preparation of the cover image(C) the secret text message(S) of size M*N will be converted
paration
image(C),
into jpeg image S2 and each pixel is represented by (8-bit/pixel).
bit/pixel).
2- Thresholding S2(i,j) to convert it into (1-bit/pixel) S2'(i,j) by using the mean(µ).
(1 bit/pixel)

…….(4)
Where 0 ≤( i , j) ≤ N , P(i,j):the value of the pixel .
3- Generate modified MACM.
4- Replace the value of coefficient S(i,j) by the value of ± β if the system is blind else adding the ± β
to the value of coefficient if the system is non-blind .
non
5- Reconstruct by(ICT)of the modified cover image(Stego Image)

.
Take a scan to the hidden

Input the cover image

Find the mean µ
4-level Contourlet transform
level

Convert to one bit per pixel

Convert to one dimensional vector

Choose the suitable subband

Permutation by chaos
Permutation process by using cat
map to find the new location
embedding process
if bind system :If S2'(i,j)=1
s(i,j)'=+β else s(i,j)'=-β
if non – blind system : if
S2'(i,j)=1 S'(i,j)=S(i,j)+ β else
S'(i,j)=S(i,j)- β

Inverse contourlet transform

Stego image

Figure (9) :Block diagram of Hiding text in image

33
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

2.3.2 EXTRACTING ALGORITHM AT THE RECEIVER SIDE
The receiver must know the secret key (a1,b1,c1) of MACM . This key has been used inside
the embedding process generated by using Modified Arnold Cat Map. The value of (α,β,θ) that were
used in hiding image in image, and text in image respectively. The stego image is decomposed by
4-level contourlet transform with the same filters used at the transmitter side and determine which
one of the subband have been used to embed the information. The extracting algorithm is the inverse
of the embedding algorithms as discussed above.
3. EXPERIMENTAL RESULTS
In this section, experimental results are given to demonstrate the performance of the suggested
algorithms. The proposed steganography method increases the embedding capacity and reduces the
stego image visual distortion by hiding the secret data in higher contourlet coefficients , beside that
we use chaotic map to increase the security ,because when a strong algorithm is used the only way to
break the system is to obtain the the key. The tests have been performed on a personal computer of
2.80 GH CPU (CORE i7), and the proposed systems are implemented by matlab* (R2013a).
3.1 MEASURING OF THE QUALITY
There are many tests that can be used for measuring the quality of the image. Firstly the
histograms of the cover image and the stego image were found to show that the statistical properties
of the cover image were not affected by changing some coefficients, so if the histogram of the cover
is nearly equal to the histogram of the cover image, then this means that proposed system was good
enough to avoid the attackers. And another one is the Normalized correlation between the coverimage and stego-image was evaluated. So when the stego-image is perceptually similar to the
original cover-image, then the normalized correlation equals one[2].
Cor ൌ

ഥ
∑౉ ∑ొ ሺେሺ୧,୨ሻିେ ሻሺୗ୲ሺ୧,୨ሻିതതതത
ୗ୲ሻ
౟సభ ౠసభ

(5)

ഥ
തതതത
ටሾ∑౉ ∑ొ ሺେሺ୧,୨ሻିେ ሻమ ሿሾ∑౉ ∑ొ ሺୗ୲ሺ୧,୨ሻିୗ୲ ሻమ ሿ
౟సభ ౠసభ
౟సభ ౠసభ

where: i: row number, j: column number, M: No. of rows of the cover image, N: No. of columns of
ത
ഥ
the cover image, C(i,j): cover image, St(i,j): stego image, C: the mean of C(i,j) and St: the mean of
St(i,j). And PSNR is usually measured in dB and given by:
PSNR ൌ 10 logଵ଴

ሺ୐ିଵሻమ

(6)

భ
∑౉ ∑ొ ሺୗ୲ሺ୧,୨ሻିେሺ୧,୨ሻሻమ
౉ൈొ ౟సభ ౠసభ

Typical PSNR values range between 20 and 40 dB [2]. And the last test is Signal-to-Noise-Ratio
(SNR),This is given in dB by :SNR ൌ 10 logଵ଴ ∑౉

∑౉ ∑ొ ൫େሺ୧,୨ሻ൯
౟సభ ౠసభ

మ

(7)

ొ
మ
౟సభ ∑ౠసభሺେሺ୧,୨ሻିୗ୲ሺ୧,୨ሻሻ ሿ

3.2 KEY SPACE AND KEY SENSITIVITY ANALYSIS
For secure system ,the key space should be large enough to make sure that the brute force
attack is infeasible, Increasing the key length exponentially increases the time that it takes an attacker
to perform a brute force attack, when the attacker trying all possible key combinations to break the
system[9]. In this algorithm, the parameters a1, b1,c1 of MACM as well as the way with which
subband is divided (choosing the number of DFB) and the dimension of subband m, n can be used
34
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

as keys ,so if the combination of all of these keys was calculated then it is large and hence, any
exhaustive search through all possible keys is impractical to get the secret data. Chaotic permutation
makes proposed system more secure because the steganography techniques reduce the chance of
detection of the secret message.
3.3 RESULTS
Then the results of implementing the algorithm including different type of data (image and text)
to be embedded in the cover image. Contourlet transform based steganography was used. This
transform provides multiscale and multidirectional representation of an image .The directionality is a
power of tow (2L) where L=[0-7] depending on the size of the image ,so more directionality means
less LL coefficients and more HH coefficients which is more suitable for embedding on it ,in the
table(1) the energy for different cover image are listed:
- peppers.png
for L=[2,2,2]

Peppers.png
(512×512)

Table (1) Energy for the subbands for L=[2,2,2]
{1,3}{1,1}
{1,3}{1,2}
{1,3}{1,3}
2772.2
894.6076
36.4840
{1,4}{1,1}
{1,4}{1,2}
{1,4}{1,3}
8577.704
13.3210
1.6398

{1,3}{1,4}
4107.1475
{1,4}{1,4}
1055.52134

So after noticing the subbands energy for the level which be choosed and comparing between
them to choose in which subband the secret message would be embedded.
3.3.1 RESULTS OF HIDING IMAGE IN IMAGE
This is done by using (512×512)pixels of different cover images ,the size of secret images is
varied with variable capacity and variable control parameter α.
3.3.1.1 NON-BLIND SYSTEM
Table(2)shows the results of the quality of the stego image with the size of the secret image that
would be embedded in the cover image.The cover image is lena (512×512) and the secret image is
the monaliza for different sizes.
Table(2) Stego image results for different size of the secret image with α=0.05 for non blind system

Dimension
Capacity(%)
of the secret image
32*32
0.39
32*64
0.78
64*64
1.56
64*128
3.125
128*128
6.25
128*256
12.5
256*256
25
256*512
50

35

PSNR
dB
59.3170
56.2821
53.1136
49.3010
47.5672
46.9269
46.7716
42.1048

N.corr.
1
1
0.9999
0.9998
0.9998
0.9996
0.9992
0.9991

SNR
dB
48.1478
45.9236
45.6374
41.2788
36.9841
36.5478
38.3868
33.8184
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME
Table(3) Results of the stego image for lena as a cover(512*512) and monaliza as a secret image(128*128)
for non blind system

Stego image

α
0.01
0.03
0.05
0.08
0.1
0.13
0.15
0.18
0.2

PSNR dB SNR dB
61.3785
51.9508
47.5672
43.4971
41.5703
39.2936
38.0545
36.4841
35.5842

50.8087
41.4356
36.9841
32.8844
30.9552
28.6760
27.4295
25.4841
24.9989

N.Corr
1
0.9999
0.9998
0.9994
0.9990
0.9983
0.9978
0.9968
0.9961

Extracted image
PSNR
SNR
N.Corr.
dB
dB
23.1512
14.8374
0.9783
28.2989
20.2329
0.9922
30.1912
21.9307
0.9951
31.1724
22.5636
0.9966
31.4585
22.7344
0.9972
31.8254
22.9192
0.9975
32.0404
23.0317
0.9976
32.2524
23.2396
0.9977
32.1790
23.3350
0.9976

The results in table (3) shows the effects of changing the value of the control parameter (α)
on the qualities of the stego image and the extracted image.
the stego image
the cover image

the secret image

the extracted image

the histogram of the cover image

the histogram of the stego image

3000

3000

2500

2500

2000

2000

1500

1500

1000

1000

500

500

0

0

0

50

100

150

200

250

0

50

100

150

200

250

Figure(10) Histogram results of embedding the cover lena(512*512),the secret monaliza (128*128) for non
blind system

Figure (10) shows the histograms of the original cover and stego image for a cover image
with (512*512). One can notice that there is no major change in shape of the histogram.
3.3.1.2 BLIND SYSTEM
To test the quality of this system we take many cases such as changing the capacity , changing
the values of alpha(α) and comparing to see the quality of both the stego image and the extracted
image as in table(4). The cover image is lena.bmp (512×512) and the secret image is
peppers.png(256×256).

36
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME
Table(4) The results of embedding the cover(512×512),the secret (256×256) for blind system
Stego image
Extracted image
N.Corr.
α
PSNR dB
SNR dB
N.Corr PSNR dB SNR dB
0.03
43.6193
35.1047
0.9994
17.8763
10.1711
0.9172
0.05
41.8646
33.6388
0.9991
21.6297
13.9355
0.9617
0.08
39.3426
31.0055
0.9983
24.0716
16.4329
0.9828
0.1
37.8269
29.3821
0.9977
24.9989
17.3260
0.9872
0.13
35.9229
27.3669
0.9964
25.6198
17.8824
0.9905
0.15
34.8084
26.1979
0.9953
26.0000
18.2226
0.9918
0.18
33.3595
24.6926
0.9935
26.2630
18.4496
0.9930
0.2
32.5037
23.8084
0.9921
26.3730
18.5350
0.9934

Table(5) The results of embedding variable size on the cover lena (512×512) with α=0.06 and secret
image is monaliza with variable size for blind system

Dimension
of the secret
image
32*32
32*64
64*64
64*128
128*128
128*256
256*256
256*512

Capacity(%)

PSNR dB

N.corr.

SNR dB

0.39
0.78
1.56
3.125
6.25
12.5
25
50

58.7759
57.0029
54.3417
53.1702
50.6927
44.3951
42.7789
40.5488

49.4867
47.0876
45.3417
45.3047
41.9723
35.1540
34.4404
33.6906

1
1
0.99994
0.99993
0.99991
0.9995
0.9992
0.9987

Table(5) shows the results of embedding variable size on the cover lena (512×512) with the
secret image is monaliza with variable size. To compare with a wavelet –based steganography
system by setting L=[0] the size of the secret image is varied to see the difference between the two
systems , see table (6) and figure (11).The cover image is lena (512×512) and the cover image is
monaliza with α =0.06.
Table(6) Embedding in wavelet domain with α =0.06

Dimension
of the secret image
32*32
32*64
64*64
64*128
128*128
128*256
256*256

Capacity(%)

PSNR dB

SNR dB

N.corr.

0.39
0.78
1.56
3.125
6.25
12.5
25

55.0306
52.1209
48.2854
45.1342
42.1410
40.1644
37.1554

45.4232
43.5882
36.8436
35.4257
32.7139
33.8576
31.1395

1
0.99991
0.9998
0.9996
0.9991
0.9986
0.9973

37
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

80
PSNR in
Contourlet
Domain

PSNR

60
40
20

PSNR in wavelet
Domain

0

0 5 10 15 20 25 30 35 40 45 50 Capacity(%)

Figure(11) Comparison between contourlet and wavelet based steganography blind- system ( the
cover image is lena(512×512)and the secret image is monaliza with variable size and α =0.06)
To evaluate the performance of the proposed system, several simulation have been performed
in order to compare its performance with other existing schemes. For hiding image in image a
comparison between our proposed method and ref.[18-19] has been showed in table(7),and for
testing purposes a cover image is selected to be the lena image (512×512) and hiding capacity is
25% , in[18] which is steganography based on wavelet and integer wavelet domain while in [36]
worked on Intermediate Significant Bit Planes.
Table (7) Comparison between proposed method and ref.[18-19]

Hiding capacity
25%

Based on
wavelet

PSNR dB

41.10

Based on
integer
wavelet
41.32

Based on
intermediate
significant bit
37.5516

Proposed
method
42.7789

3.3.2 RESULTS OF HIDING TEXT IN AN IMAGE
A copy of a text message will be taken with variable size to test the quality of both the stego
image and the secret message. The proposed system both kinds blind and non-blind will be
implemented . The examples of text messages used in this algorithm are listed in figure (12)
the extracted image

a- T1

b- T2

Figure (12) Different secret text messages used

3.3.2.1 NON-BLIND SYSTEM
Table(8)shows the results of the quality of the stego image according to the size of the secret
message that would be embedded in the cover image, Fig.(15)shows the embedding of text
message(T2) on the cover image(lena).

38
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

Table(8) Results of embedding, the cover (512*512) with different size of secret message for non
blind system
dimension

32*32
64*64
128*128
128*256
256*256
350*375
365*403

No.of
bits

1,024
4,096
16,384
32,768
65,536
131,250
147,095

Stego image
PSNR
dB
69.3646
63.0397
56.8879
55.0724
47.0590
44.6547
44.5187

Extracted image

SNR dB

N.Corr

63.2467
46.9229
50.6224
49.0867
37.5902
37.7035
37.8660

1
1
1
1
0.9998
0.9996
0.9996

PSNR
dB
51.3682
50.9742
48.6745
45.9783
40.3833
29.3912
29.1718

SNR dB

N.Corr.

42.4736
40.7584
35.5143
30.1496
22.3721
17.3222
21.0575

1
1
1
1
0.9997
0.9955
0.9952

Table(9) The effect of beta on the non blind system
Stego image
β
PSNR dB
SNR dB
N.corr.
5
37.1676
30.8111
0.9973
4
39.1058
32.7493
0.9983
3
41.6046
35.2481
0.9990
2
45.1264
38.7699
0.9996
1
51.1470
44.7905
0.99997

the stego image

the stego image

the extracted image

the secret image

Figure (13): Results of embedding the cover (512*512),the secret (350*375) (131,072)bit for non
blind system
Table (9) shows the effect of changing the value of β on the quality of the system where the
cover image is lena (512*512), the secret message is T2(350*375)bit. Figure(13) shows the
embedding of text message (T2) on the cover image (lena). Table(10)shows the results of the
embedding process for all of the secret message (T1-T2)with size(128*256)bit , the cover is women
with(256*256) and β= 0.5.

39
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

Table(10) Results of embedding different text massage(128*256) in (256*256)cover image
Stego image
Secret
message
T1
T5

Extracted message

PSNR db

SNR dB

N.corr.

PSNR dB

SNR dB

N.corr.

56.8470
56.5772

50.6402
50.3260

1
1

25.8603
42.1442

16.2964
18.0618

0.9932
0.9998

3.3.2.2 BLIND SYSTEM
Results of the stego (lena is a cover (512*512)) with different text message with size (256*256)
are shown in table(11). If the value of beta is changed, the quality of both the stego and extract
message will be affected as shown in table(12),where the cover image is women(256×256)and the
secret is T1(128×128).

Table(11) Results of embedding different text message(256*256)bit in (512*512)cover image for
blind system
Stego image
Secret
message
T1
T2
.

Extracted message

PSNR

SNR

N.corr.

PSNR

SNR

N.corr.

44.1165
44.1470

35.3251
35.3267

0.9995
0.9993

23.7719
23.2798

12.5742
13.4562

0.9993
0.9995

Table(12) The effect of beta (β)on the stego image for blind system
β
5
4
3
2
1

PSNR
39.7947
41.5323
43.6274
46.1686
48.9874

Stego image
SNR
0.9984
0.9989
0.9993
40.1294
4.4063

N.corr.
34.5852
36.2457
38.1491
0.9996
0.9998

For a comparison between our proposed method and ref.[7] which is worked on
steganography based on Double Density Dual Tree Discrete Wavelet Transform (DD DT DWT). For
testing purposes a cover image is selected to be the lena image (512×512) and a secret data is a
binary sequence (0, 1) .Table (13) shows the comparison between our proposed system and system in
ref. [7].
Table (13) Comparison between our proposed system and system in ref. [7]
Ref.[7]
Hiding capacity
PSNR

5000 bit
38.8541bit

40

Proposed
method
56,536 bit
44.1475
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

4. CONCLUSIONS
The results obtained for different types of cover images and different types of the secret
message, the stego image was obtained with very closed properties to the original cover image so it
is so difficult to distinguish between them also a good result for the extracted message was obtained
which show robustness of the proposed algorithm to be achieved for data hiding on image. The high
capacity requirement conflicts with the high PSNR requirement. Generally speaking, when the
capacity increases, the error also increases, and this affects the PSNR, SNR and NC inversely. A
trade-off should be made between capacity and these requirements. So the use of the Contourlet
Transform can increase the capacity of the secret message up to half the size of the cover image
because it provides multiscale and multidirectional. MACM(Modified Arnold Cat Map) increases the
security of the system by using the parameters of this chaotic map as a secret key between the
transmitter and receiver. The results obtained from the proposed system(when the secret message
was an image), when compared with the same system but based on Wavelet , it's clear that the
embedding on the Contourlet Domain provides better quality of the stego image up to 3.5dB higher
than the system based on wavelet.
REFERENCES
[1]

[2]
[3]
[4]
[5]

[6]

[7]

[8]

[9]

[10]

[11]

Shamim Ahmed Laskar, Kattamanchi Hemachandran," Secure Data Transmission Using
Steganography and Encryption Technique", International Journal on Cryptography and
Information Security (IJCIS), Vol.2, No.3, September, 2012.
Firas A. Sabir," Evaluation Of Information Hiding For Still Image", M.Sc.thesis , university
of Technology, Baghdad, 2004.
Niels Provos and Peter Honeyman," Hide and Seek: An Introduction to Steganography",
IEEE Security & Privacy, 540-7993/03, 2003.
Michael D. Richard, "Estimation and Detection with Chaotic Systems "Massachusetts
Institute of Technology Cambridge, 1994.
Hedieh Sajedi ,Mansour Jamzad," Secure steganography based on embedding capacity",
Springer-Verlag , International Journal of Information Security, volume 8, Issue 6, pp 433445, 2009.
Rosanne English," Comparison of High Capacity Steganography Techniques", IEEE,
International Conference of Soft Computing and Pattern Recognition, 978-1-4244-7896-2,
2010.
S.K.Muttoo,Sushil Kumar," A Multilayered Secure, Robust and High Capacity Image
Steganographic Algorithm" IEEE, 3rd International Conference on Communication
Systems Software and Middleware and Workshops, COMSWARE, 2008.
Niansheng Liu, Donghui Guo," Multiple Image Information Hiding Technique Based on
Chaotic Sequences",IEEE, International Conference on Convergence Information
Technology, 0-7695-3038-9/07, 2007.
Ying Li, Qiang Zhang, Na Ma,"A Stratified Image-Hiding Method Based on Chaos", IEEE
Fifth International Conference,Bio-Inspired Computing: Theories and Applications (BICTA),978-1-4244-6437-1,2010.
Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez," A New Chaos Steganography
Algorithm for Hiding Multimedia Data" , Advanced Communication Technology (ICACT),
14th International Conference on ICACT, Feb. 2012,IEEE.
Sreejith.V, Srijith.K, Rajesh Cherian Roy," Robust Blind Digital Watermarking in Contourlet
Domain", International Journal of Computer Applications, November 2012.

41
International Journal of Electronics and Communication Engineering & Technology (IJECET),
ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME

[12] Hedieh Sajedi, Mansour Jamzad," Using contourlet transform and cover selection for secure
steganography", 2010, Springer.
[13] Malini Mohan & Anurenjan P.R," A New Algorithm for Data Hiding in Images using
Contourlet Transform", IEEE, Recent Advances in Intelligent Computational Systems
(RAICS),978-1-4244-9477-4/11,2011.
[14] Seyyed Mohammad Reza Farschi · H. Farschi," A novel chaotic approach for information
hiding in image", Nonlinear Dyn ,Springer, 2012.
[15] Minh N. Do and Martin Vetterli,( Fellow IEEE),"The Contourlet Transform: An Efficient
Directional Multiresolution Image Representation", IEEE Transactions On Image
Rocessing,Vol.14,No.12, December 2005.
[16] Duncan D.-Y. Po and Minh N. Do( Member IEEE) ,"Directional Multiscale Modeling of
Images using the Contourlet Transform", Vol.15,Issue 6, IEEE Transactions On Image
Processing, 2006.
[17] Nagham Salim Mohammed Al-lella ,"Contourlet Transformation for Data Hiding", A Msc
Thesis Submitted By , Computer Sciences and Mathematics University of Mosul,2013
[18] Shabir A. Parah, Javaid A. Sheikh" Data Hiding in Intermediate Significant Bit Planes, A
High Capacity Blind Steganographic Technique" IEEE, International Conference on
Emerging Trends in Science, Engineering and Technology, 978-1-4673-5144-7/12, 2012.
[19] K. B. Raja, S. Sindhu, T. D. Mahalakshm," Robust Image Adaptive Steganography using
Integer Wavelets", IEEE IMAGE PROCESSING, 2011.
[20] Shamim Ahmed Laskar and Kattamanchi Hemachandran, “Steganography Based on Random
Pixel Selection for Efficient Data Hiding”, International Journal of Computer Engineering &
Technology (IJCET), Volume 4, Issue 2, 2013, pp. 31 - 44, ISSN Print: 0976 – 6367,
ISSN Online: 0976 – 6375.
[21] Jaspreet Kaur and Chirag Sharma, “Multimodality Medical Image Fusion using Improved
Contourlet Transformation with Log Gabor Filters”, International Journal of Electronics
and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013,
pp. 383 - 389, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
[22] Nagham Hamid, Abid Yahya, R. Badlishah Ahmad and Osamah M. Al-Qershi, “An
Improved Robust and Secured Image Steganographic Scheme”, International Journal of
Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 3,
2012, pp. 22 - 33, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.

42

More Related Content

What's hot

MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...ijcseit
 
Image compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoderImage compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoderIAEME Publication
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482IJRAT
 
4 satellite image fusion using fast discrete
4 satellite image fusion using fast discrete4 satellite image fusion using fast discrete
4 satellite image fusion using fast discreteAlok Padole
 
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) cscpconf
 
Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)csandit
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...CSCJournals
 
The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)James McMurray
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingCSCJournals
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...IJORCS
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...Dr. Amarjeet Singh
 
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTIONBLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTIONijcisjournal
 
Continuous and Discrete Crooklet Transform
Continuous and Discrete Crooklet TransformContinuous and Discrete Crooklet Transform
Continuous and Discrete Crooklet TransformDR.P.S.JAGADEESH KUMAR
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwareCSCJournals
 
Fuzzy entropy based optimal
Fuzzy entropy based optimalFuzzy entropy based optimal
Fuzzy entropy based optimalijsc
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...eSAT Publishing House
 

What's hot (20)

MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
MULTI-OBJECTIVE ENERGY EFFICIENT OPTIMIZATION ALGORITHM FOR COVERAGE CONTROL ...
 
Image compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoderImage compression by ezw combining huffman and arithmetic encoder
Image compression by ezw combining huffman and arithmetic encoder
 
Paper id 26201482
Paper id 26201482Paper id 26201482
Paper id 26201482
 
4 satellite image fusion using fast discrete
4 satellite image fusion using fast discrete4 satellite image fusion using fast discrete
4 satellite image fusion using fast discrete
 
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB) IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
IMAGE CODING THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IZEB)
 
Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)Image coding through ztransform with low energy and bandwidth (izeb)
Image coding through ztransform with low energy and bandwidth (izeb)
 
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
Determining the Efficient Subband Coefficients of Biorthogonal Wavelet for Gr...
 
The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)The Gaussian Process Latent Variable Model (GPLVM)
The Gaussian Process Latent Variable Model (GPLVM)
 
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video CodingAn Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
20120140506008 2
20120140506008 220120140506008 2
20120140506008 2
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
 
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTIONBLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
BLIND AND ROBUST IMAGES WATERMARKING BASED ON WAVELET AND EDGE INSERTION
 
190 195
190 195190 195
190 195
 
Continuous and Discrete Crooklet Transform
Continuous and Discrete Crooklet TransformContinuous and Discrete Crooklet Transform
Continuous and Discrete Crooklet Transform
 
Fx3111501156
Fx3111501156Fx3111501156
Fx3111501156
 
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism HardwarePerformance Improvement of Vector Quantization with Bit-parallelism Hardware
Performance Improvement of Vector Quantization with Bit-parallelism Hardware
 
Fuzzy entropy based optimal
Fuzzy entropy based optimalFuzzy entropy based optimal
Fuzzy entropy based optimal
 
Journal_IJABME
Journal_IJABMEJournal_IJABME
Journal_IJABME
 
A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...A systematic image compression in the combination of linear vector quantisati...
A systematic image compression in the combination of linear vector quantisati...
 

Viewers also liked

Viewers also liked (20)

50320130403001 2-3
50320130403001 2-350320130403001 2-3
50320130403001 2-3
 
ah não gosto de comer
ah não gosto de comerah não gosto de comer
ah não gosto de comer
 
Trade Certs
Trade CertsTrade Certs
Trade Certs
 
LAM_280_Final Set
LAM_280_Final SetLAM_280_Final Set
LAM_280_Final Set
 
Funciones de busqueda
Funciones de busqueda Funciones de busqueda
Funciones de busqueda
 
SJ Sub Upgrade
SJ Sub UpgradeSJ Sub Upgrade
SJ Sub Upgrade
 
HENDY HANAN profile
HENDY HANAN profileHENDY HANAN profile
HENDY HANAN profile
 
123
123123
123
 
Katana_Brochure
Katana_BrochureKatana_Brochure
Katana_Brochure
 
Sommer, Don Master Bath
Sommer, Don Master BathSommer, Don Master Bath
Sommer, Don Master Bath
 
TransLaw - Intermodal 1999
TransLaw - Intermodal 1999TransLaw - Intermodal 1999
TransLaw - Intermodal 1999
 
Cultural Connoisseur
Cultural ConnoisseurCultural Connoisseur
Cultural Connoisseur
 
Ecoflow Catalog_3page (1)
Ecoflow Catalog_3page (1)Ecoflow Catalog_3page (1)
Ecoflow Catalog_3page (1)
 
Amaia Montero
Amaia MonteroAmaia Montero
Amaia Montero
 
All Certificates
All CertificatesAll Certificates
All Certificates
 
Professores Apaixonados
Professores ApaixonadosProfessores Apaixonados
Professores Apaixonados
 
Grupo 4....mermoria ram
Grupo 4....mermoria ramGrupo 4....mermoria ram
Grupo 4....mermoria ram
 
Cosmen Alsa. Dinero. 99
Cosmen Alsa. Dinero. 99Cosmen Alsa. Dinero. 99
Cosmen Alsa. Dinero. 99
 
Estrategias de Eliminación de enfermedades infecciosas 12 de junio 2015
Estrategias de Eliminación de enfermedades infecciosas 12 de junio 2015Estrategias de Eliminación de enfermedades infecciosas 12 de junio 2015
Estrategias de Eliminación de enfermedades infecciosas 12 de junio 2015
 
TALIC BROCHURE
TALIC BROCHURETALIC BROCHURE
TALIC BROCHURE
 

Similar to 40120140501004

ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...sipij
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using WaveletIRJET Journal
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...ijma
 
Paper id 25201478
Paper id 25201478Paper id 25201478
Paper id 25201478IJRAT
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...journalBEEI
 
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingA Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingIOSR Journals
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMScsandit
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMScsandit
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...ijistjournal
 
QRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsQRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsIDES Editor
 
Sparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
Sparsity based Joint Direction-of-Arrival and Offset Frequency EstimatorSparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
Sparsity based Joint Direction-of-Arrival and Offset Frequency EstimatorJason Fernandes
 
Boosting CED Using Robust Orientation Estimation
Boosting CED Using Robust Orientation EstimationBoosting CED Using Robust Orientation Estimation
Boosting CED Using Robust Orientation Estimationijma
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSIJNSA Journal
 

Similar to 40120140501004 (20)

ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...ANALYSIS OF INTEREST POINTS OF CURVELET  COEFFICIENTS CONTRIBUTIONS OF MICROS...
ANALYSIS OF INTEREST POINTS OF CURVELET COEFFICIENTS CONTRIBUTIONS OF MICROS...
 
Block Image Encryption using Wavelet
Block Image Encryption using WaveletBlock Image Encryption using Wavelet
Block Image Encryption using Wavelet
 
B042107012
B042107012B042107012
B042107012
 
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
Mimo radar detection in compound gaussian clutter using orthogonal discrete f...
 
Paper id 25201478
Paper id 25201478Paper id 25201478
Paper id 25201478
 
A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...A novel technique for speech encryption based on k-means clustering and quant...
A novel technique for speech encryption based on k-means clustering and quant...
 
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image DenoisingA Comparative Study of Wavelet and Curvelet Transform for Image Denoising
A Comparative Study of Wavelet and Curvelet Transform for Image Denoising
 
Presentation
PresentationPresentation
Presentation
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
 
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMSFINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
FINGERPRINTS IMAGE COMPRESSION BY WAVE ATOMS
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
 
QRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsQRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband Signals
 
Sparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
Sparsity based Joint Direction-of-Arrival and Offset Frequency EstimatorSparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
Sparsity based Joint Direction-of-Arrival and Offset Frequency Estimator
 
Dr35672675
Dr35672675Dr35672675
Dr35672675
 
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
ADAPTIVE CONTOURLET TRANSFORM AND WAVELET TRANSFORM BASED IMAGE STEGANOGRAPHY...
 
15
1515
15
 
Boosting CED Using Robust Orientation Estimation
Boosting CED Using Robust Orientation EstimationBoosting CED Using Robust Orientation Estimation
Boosting CED Using Robust Orientation Estimation
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

40120140501004

  • 1. International Journal of ElectronicsJOURNAL OF ELECTRONICS AND INTERNATIONAL and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 1, January (2014), pp. 26-42 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2013): 5.8896 (Calculated by GISI) www.jifactor.com IJECET ©IAEME HIGH CAPACITY STEGANOGRAPHY BASED ON CHAOS AND CONTOURLET TRANSFORM FOR HIDING MULTIMEDIA DATA Eng. Zaynab Najeeb Abdulhameed(1), Prof. Maher K. Mahmood(2) (1) University of Al –Anbar, College Of Dentistry, Iraq University of Al – Mustansiriya, College of Engineering, Electrical Engineering Department, Iraq (2) ABSTRACT In the last years the subject of hiding information has been effective, and steganography is one of the most important subdisciplines. Many of the algorithms appeared to work on developing efficient techniques of practical steganography. Steganography is the science that deals with hiding of secret data in some carrier media which may be image, audio, formatted text or video. The main idea behind this is to conceal the very existence of data. We deal here with image steganography. This work presents techniques of image steganography (Blind and non-Blind) based on chaotic system and Contourlet Transform, the chaotic system is used due to many properties; first of all using a Modified Arnold Cat Map( MACM ) to increase the key space which makes it very difficult to extract the secret message by the enemy. In this method, embedding is done in Contourlet domain that provides large embedding capacity, after that the correct location of embedding would be selected carefully to decrease the distortion on the cover image to avoid the detection of this process. Experiments and comparative studies showed the effectiveness of the proposed technique in generating stego images. In addition, its superiority is shown by comparison with a similar waveletbased steganography approach. The measurement of the quality of the stego image was depended on the PSNR, SNR and Correlation for measuring the similarity between the cover image and the stego image . KEYWORDS: Steganography, Blind and non-Blind, Contourlet Transform, Modified Arnold cat Map. 1- INTRODUCTION Steganography is an ancient art that has been reborn in recent years. The word Steganography comes from Greek roots which literally means "covered writing', and is usually interpreted to mean hiding information in between other information [1]. Steganography is a very old method of passing messages in secret. This method of message cloaking goes back to the time of the ancient Greeks. 26
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME During the WWII World War II spies on both sides used "invisible ink"[2]. The most important requirement for a steganographic algorithm is: capacity, security, and robustness [3]. -Capacity. refers to the amount of information that a data hiding scheme can successfully embed without a noticeable distortion in the marked media. -Security. The embedding algorithm is said to be secure if the embedded information cannot be removed beyond reliable detection by targeted attacks based on a full knowledge of the embedding algorithm and to detector. -Robustness. The embedded information is said to be robust if its presence can be reliably detected after the image has been modified but not destroyed beyond recognition. Steganographic methods can be broadly classified based on the embedding domain, digital steganography techniques are classified into (i) spatial domain (ii) frequency domain. In spatial domain method, the secret message is directly embedded into the host image by changing its pixel value. Transform domain tries to encode message bits in the transform domain coefficients of the image. Transformed are more robust compared to spatial domain ones. Transform domain techniques includes Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT), Discrete Wavelet Transform (DWT) etc. DWT is broadly used for digital steganography since it has better performance than other transform domain techniques. DWT is a multiresolution and time frequency representation. It captures only the discontinuities at edge points of the image in three directions at each resolution and lacks in capturing smoothness along the contours. This problem has been solved by the Contourlet Transform (CT). Chaos is aperiodic long–term behavior in a deterministic System, . The field was pioneered by Lorenz (1963), chaos mathematically is defined as ‘randomness’ generated by simple deterministic systems, This randomness is a result of the sensitivity of chaotic systems to the initial conditions[4].A chaotic map is a map that exhibits some sort of chaotic behavior used to increase the security. The most attractive feature of chaos in information hiding area is its extreme sensitivity to initial conditions. There are many researches in each of the steganography techniques ,and a brief description of some of these research are presented :For the researches which are presented the high capacity steganography methods are [5-7],For the researches which are presented the chaos based steganography methods are [8-10] , and for the researches presented the steganography based on contourlet transform are [11-13]. This work implemented both types: blind system which means that the receiver does not need the original cover image to extract the information hiding, and non blind which means the original cover image was needed to compare and extract the secret information. In all of these algorithms, the cover was decomposed into many levels using contourlet transform(CT)and calculating the energy of the subbands to hide the information in the subbands that have less energy in order to decrease the distorting effect in the cover image, then we embedded the secret information using chaotic map which was used to shuffle the secret information overall the cover image. 2. PROPOSED APPROACH 2.1 CHAOTIC MAP A chaotic map is a map that exhibits some sort of chaotic behavior. Maps may be parameterized by a discrete-time or a continuous-time parameter. Discrete maps usually take the form of iterated functions [4]. By a deterministic map, we mean an evolution equation specified by a function f :M M mapping some space M to itself, which gives rise to a time series {x(i)} satisfying the relation. x(n + 1) = f(x(n)) =f ୬ (x(0)).The action of the map on the unit square is often explained 27
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME with a picture of a cat, which gave the map its name. The mathematical formula is [14]: C(x; y) = (x+y mod 1, x+ 2y mod 1) =( 1 1 x ) ( ) mod 1 1 2 y (1) where "a" mod 1 .means the fractional part of "a" for any real "a". Denoting the square 2×2 matrix as A .|A |is equal to 1. Equation (1) is one-to-one, each point of the unit square is uniquely mapped into another point in the unit square. The Lyapunov exponents of the Arnold cat map are calculated by finding the eigenvectors of the matrix in eq. (1) [16] were: λ1 ൌ , λ2 ൌ , we see that λ1 2 2 >1 and λ2 < 1 , Hence, the Lyapunov exponents of eq. (1) are ι1=ln(λ1) ,ι2=ln(λ2).It is clear that one of the Lyapunov exponents, i.e., λ1, is positive It can be easily seen that the original Arnold transformations given by equation (1) can be modified to produce a sequence of Arnold transformations ,and One way to generalize the above 2-D Arnold cat map can be achieved by introducing new parameters(a1,b1,c1) to increase and ensure high security implementation a as follows [14],assume that we have an N × N image P. Arnold cat map is given as follows: 3ା√5 1 x′ ( ) =൤ y′ aଵ x bଵ ൅ cଵ ଶ ଶ ൨ (y) (mod N) 1 ൅ aଵ bଵ ൅ aଵ cଵ 3ି√5 (2) where a1,b1 and c1 are positive control parameters ‫ א‬R , (x' , y') are the coordinate values of the shuffled pixel.One can easily notice that ,|A |is equal to 1, which means that eq. (2) is one-to-one. Furthermore to find the LE of this matrix first we must find the eigenvalues of A . λ1 ൌ మ 2ାୟభ ୠభ ାୟభ ୡభ 2 ାට൫2ାୟభ ୠభାୟభ ୡభ 2 ൯ ିସ 2 and λ2 ൌ మ 2ାୟభ ୠభ ାୟభ ୡభ 2 ିට൫2ାୟభ ୠభ ାୟభ ୡభ 2 ൯ ିସ 2 , i.e. ι1=ln(λ1) ,ι2=ln(λ2), we see that λ1 >1 and λ2 < 1 when we choose (a1, b1 , c1) > 0 and (a1, b1 , c1) ‫ א‬R , one of the Lyapunov exponents is positive, so we use these parameters as control to increase the security. 2.2 THE CONTOURLET TRANSFORM The limitations of commonly used separable extensions of one-dimensional transforms, such as the Fourier and wavelet transforms, in capturing the geometry of image edges are well known, contourlet transform “true” two-dimensional transform that can capture the intrinsic geometrical structure that is key in visual information. A discrete-domain multiresolution and multidirection expansion using nonseparable filter banks, in much the same way that wavelets were derived from filter banks. This construction results in a flexible multiresolution , local, and directional image expansion using contour segments, and thus it is named the contourlet transform [15]. Do and Vetterli developed the contourlet transform based on an efficient two-dimensional multiscale and directional filter bank that can deal effectively with images having smooth contours. The contourlet transform uses iterated filter banks, which makes it computationally efficient; specifically, it requires O(N) operations for an N-pixel image [16]. The contourlet transform has all of these properties while the wavelet transform provided only the first three [15]: 1) Multiresolution. 2) Localization. 3) Critical sampling. 4) Directionality. 5) Anisotropy. 28
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME 2.2.2 THE CONSTRUCTION OF THE CONTOURLET TRANSFORM Figure (1) An illustration of Contourlet Transform Figure(1) shows the construction of the contourlet transform.The contourlet transform is a combination of two transforms namely: 1) The Laplacian Pyramid (LP) with special filters and reconstruction scheme .For dividing the image into a low pass and a high pass subband. 2) A two dimensional directional filter bank for splitting the high pass subband into different spatial frequency orientations. The combined properties of these transforms provide us with the desired properties of a multi directional transform for digital images , and by successively applying the transform on the low pass image, we also achieve a multiresolution representation[16]. Figure (2) depicts this decomposition process, whereH and G are called (lowpass) analysis and synthesis filters, respectively, and M is the up or down sampling matrix. The process can be iterated on the coarse (downsampled lowpass) signal[15]. a x p b Figure(2) Laplacian pyramid (one level LP decomposition). Where x : the original image, a : coarse approximation, b: the difference between the original x and prediction image p. For one level LP decomposition ,the Laplacian pyramid generates a down sampled low pass version of the original and the difference between the original "x" and the prediction "p", resulting in a bandpass image "b" (prediction error) see figure(2) [17]. By repeating these steps several times a sequence of images are obtained. If these images are stacked one above other ,the result is a tapering pyramid data structure as shown in figure(3). w2 Level 2 (5, 5) Level 1 w1 Level 0 (−5,−5 ) Figure( 3) Laplacian pyramid Figure (4) Directional filter bank frequency partitioning L= 3 and there are 23 = 8 real wedge-shaped frequency bands 29
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME A 2-D directional filter bank (DFB) that can be maximally decimated while achieving perfect reconstruction. The DFB is efficiently implemented via a L-level tree-structured decomposition that leads to 2L subbands with wedge-shaped frequency partition as shown in figure(4)[16]. 2.3 IMPLEMENTATION OF THE PROPOSED SYSTEM This work includes hiding image in an image and hiding text in an image. In these algorithms we have expressed interest to the quality of the extracted secret information besides the quality of the stego image, compared with the original cover. 2.3.1 THE TRANSMITTER SIDE All of the algorithms are implemented in both types: blind and non blind system. In all of these algorithms, the transmitter analyses the cover (digital image) into many levels using contourlet transform CT(decomposition) and calculating the energy of the subbands to hide the information in the subbands that have less energy in order to decrease the distorting effect in the cover image, then we embed the secret information using chaotic map(Arnold cat map) which was used to shuffle the secret information overall the cover image ,after that doing the reconstruction is performed by (ICT) to get the transmitter stego-image as shown in figure(5). Cover image Contourlet decomposition Finding subband energy Secret message Embedding process (shuffling information in the cover by ACM) Contourlet reconstruction Stego image Figure(5) The main block diagram at the transmitter side First in these systems the cover image should be selected carefully like choosing the cover with low details so when the high frequency is replaced with another information, the cover image was decomposed by contourlet transform(CT). In this transform the first subband is the low pass region as a result of applying Laplacian Pyramids(LP) which divides the image into a low pass and high pass subband and if this step is repeated several times this leads to get multilevel of splitting of the lowpass ,then the directional filter bank (DFB) is used to split the high pass subband .The DFB is efficiently implemented via an m-level binary tree decomposition that leads to 2m frequency partitioning, To explain these steps let us represent it by the sequence : [L]=ൣℓଵ , ℓଶ , ℓଷ , ℓସ , … . . ℓ୫ ൧ Where m: no. of level, and ℓ୧ =number of directions of the ith level , up to 2^ℓ୫ number of subbands . The dimension of the cover should be power of two (2n), where n:is an integer . - If [L]=[1,2,3,4] ,the first level has 21=2 subbands, the second level has 22=4subbands ,the third level has 23=8 subbands, and the fourth level has 24=16 subbands as shown in fig.(6) where the dimension of the low pass subband is (32×32) only and all of the others are high frequency, the dimension of the high frequency subband for the first level is (32×64) for both of the subband, for the second level is (64×64) for all of the subbands, for the the third level is (64×128) for all of the subbands, and for the the fourth level is (64×256) for all of the subbands , adding together for all levels ,then we have: 32*32+(2*32*64)+(4*64*64)+(8*64*128)+(16*64*256)=349,184 coefficients 30
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME Figure(6) 4-level Contourlet decomposition Now to embed the information inside the cover image( say lena with size of 512*512). In this work 4-level decomposition of contourlet transform is used as shown in figure (6).The embedding operation would be at the last level .The number of directions in the last level will be determined depending on the size of the information that want to be embedded in the highpass subband , after that depending on the energy of the subbands the position of the secret information will be determined .To calculate the energy of the contourlet coefficients, equation(3) will be used : E =∑i ∑j │sሺi, jሻଶ │ …….(3) Where 0 ≤( i , j) ≤ N , s(i,j):the value of the contourlet coefficient . Then by aapplying Modified Arnold Cat Map(MACM) to an image the result becomes imperceptible or noisy ,where( a1 ,b1 and c1 ) are positive control parameters as a secret key between 31
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), Engineering ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME the sender and recipient . This operation will be used inside the embedding process to shuffle the secret information overall the intended subband. Let's consider a (4×4)block , then if (MACM) is subband applied on its pixels then new positions of each pixel as in figure(7). 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 16 2 8 10 9 15 1 7 6 12 14 4 3 5 11 13 Figure (7) Applying MACM to (4×4)block and(a1=2,b1=3,c1=4) (4×4 2.3.1.1 EMBEDDING ALGORITHMS 2.3.1.1A HIDING IMAGE IN IMAGE The steps for this algorithms as shown in figure(8) are: fig 1- After preparation of the cover image(C) eparation 2- Convert the secret image into vector(1-dimension)(SV1-blind)&(SV2-non-blind). vector(1 blind). 3- Multiply by a factor SV1'= SV1*α and SV2'=SV2* α. 4- Generate modified MACM. 5- If the system is blind then replace the value of coefficient S(i,j) by the value of SV1',else adding the value of SV2' to the original value of the coefficient in case the system is non-blind. th blind. 6- Reconstruct by(ICT)to give the stego Image Image. Input the cover image Input The hidden image Convert to 1-vector SV1 for blind system 4-level Contourlet transform transform Decomposed by CT and Convert to 1-vector SV2 for blind system SV1'=SV1*α for blind or SV2'=SV2* α if non-blind blind Choose the suitable subband Permutation process by using CAT map to find the new location and S(i,j)=SV' if blind system S(i,j)=S(i,j)+SV' if non-blind system non Inverse contourlet transform Stego image Figure (8): Block diagram of Hiding image in image : 32
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), Engineering ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME 2.3.1.1 b: HIDING TEXT IN IMAGE The steps for this algorithms as shown in figure(9) are: fig 1- After preparation of the cover image(C) the secret text message(S) of size M*N will be converted paration image(C), into jpeg image S2 and each pixel is represented by (8-bit/pixel). bit/pixel). 2- Thresholding S2(i,j) to convert it into (1-bit/pixel) S2'(i,j) by using the mean(µ). (1 bit/pixel) …….(4) Where 0 ≤( i , j) ≤ N , P(i,j):the value of the pixel . 3- Generate modified MACM. 4- Replace the value of coefficient S(i,j) by the value of ± β if the system is blind else adding the ± β to the value of coefficient if the system is non-blind . non 5- Reconstruct by(ICT)of the modified cover image(Stego Image) . Take a scan to the hidden Input the cover image Find the mean µ 4-level Contourlet transform level Convert to one bit per pixel Convert to one dimensional vector Choose the suitable subband Permutation by chaos Permutation process by using cat map to find the new location embedding process if bind system :If S2'(i,j)=1 s(i,j)'=+β else s(i,j)'=-β if non – blind system : if S2'(i,j)=1 S'(i,j)=S(i,j)+ β else S'(i,j)=S(i,j)- β Inverse contourlet transform Stego image Figure (9) :Block diagram of Hiding text in image 33
  • 9. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME 2.3.2 EXTRACTING ALGORITHM AT THE RECEIVER SIDE The receiver must know the secret key (a1,b1,c1) of MACM . This key has been used inside the embedding process generated by using Modified Arnold Cat Map. The value of (α,β,θ) that were used in hiding image in image, and text in image respectively. The stego image is decomposed by 4-level contourlet transform with the same filters used at the transmitter side and determine which one of the subband have been used to embed the information. The extracting algorithm is the inverse of the embedding algorithms as discussed above. 3. EXPERIMENTAL RESULTS In this section, experimental results are given to demonstrate the performance of the suggested algorithms. The proposed steganography method increases the embedding capacity and reduces the stego image visual distortion by hiding the secret data in higher contourlet coefficients , beside that we use chaotic map to increase the security ,because when a strong algorithm is used the only way to break the system is to obtain the the key. The tests have been performed on a personal computer of 2.80 GH CPU (CORE i7), and the proposed systems are implemented by matlab* (R2013a). 3.1 MEASURING OF THE QUALITY There are many tests that can be used for measuring the quality of the image. Firstly the histograms of the cover image and the stego image were found to show that the statistical properties of the cover image were not affected by changing some coefficients, so if the histogram of the cover is nearly equal to the histogram of the cover image, then this means that proposed system was good enough to avoid the attackers. And another one is the Normalized correlation between the coverimage and stego-image was evaluated. So when the stego-image is perceptually similar to the original cover-image, then the normalized correlation equals one[2]. Cor ൌ ഥ ∑౉ ∑ొ ሺେሺ୧,୨ሻିେ ሻሺୗ୲ሺ୧,୨ሻିതതതത ୗ୲ሻ ౟సభ ౠసభ (5) ഥ തതതത ටሾ∑౉ ∑ొ ሺେሺ୧,୨ሻିେ ሻమ ሿሾ∑౉ ∑ొ ሺୗ୲ሺ୧,୨ሻିୗ୲ ሻమ ሿ ౟సభ ౠసభ ౟సభ ౠసభ where: i: row number, j: column number, M: No. of rows of the cover image, N: No. of columns of ത ഥ the cover image, C(i,j): cover image, St(i,j): stego image, C: the mean of C(i,j) and St: the mean of St(i,j). And PSNR is usually measured in dB and given by: PSNR ൌ 10 logଵ଴ ሺ୐ିଵሻమ (6) భ ∑౉ ∑ొ ሺୗ୲ሺ୧,୨ሻିେሺ୧,୨ሻሻమ ౉ൈొ ౟సభ ౠసభ Typical PSNR values range between 20 and 40 dB [2]. And the last test is Signal-to-Noise-Ratio (SNR),This is given in dB by :SNR ൌ 10 logଵ଴ ∑౉ ∑౉ ∑ొ ൫େሺ୧,୨ሻ൯ ౟సభ ౠసభ మ (7) ొ మ ౟సభ ∑ౠసభሺେሺ୧,୨ሻିୗ୲ሺ୧,୨ሻሻ ሿ 3.2 KEY SPACE AND KEY SENSITIVITY ANALYSIS For secure system ,the key space should be large enough to make sure that the brute force attack is infeasible, Increasing the key length exponentially increases the time that it takes an attacker to perform a brute force attack, when the attacker trying all possible key combinations to break the system[9]. In this algorithm, the parameters a1, b1,c1 of MACM as well as the way with which subband is divided (choosing the number of DFB) and the dimension of subband m, n can be used 34
  • 10. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME as keys ,so if the combination of all of these keys was calculated then it is large and hence, any exhaustive search through all possible keys is impractical to get the secret data. Chaotic permutation makes proposed system more secure because the steganography techniques reduce the chance of detection of the secret message. 3.3 RESULTS Then the results of implementing the algorithm including different type of data (image and text) to be embedded in the cover image. Contourlet transform based steganography was used. This transform provides multiscale and multidirectional representation of an image .The directionality is a power of tow (2L) where L=[0-7] depending on the size of the image ,so more directionality means less LL coefficients and more HH coefficients which is more suitable for embedding on it ,in the table(1) the energy for different cover image are listed: - peppers.png for L=[2,2,2] Peppers.png (512×512) Table (1) Energy for the subbands for L=[2,2,2] {1,3}{1,1} {1,3}{1,2} {1,3}{1,3} 2772.2 894.6076 36.4840 {1,4}{1,1} {1,4}{1,2} {1,4}{1,3} 8577.704 13.3210 1.6398 {1,3}{1,4} 4107.1475 {1,4}{1,4} 1055.52134 So after noticing the subbands energy for the level which be choosed and comparing between them to choose in which subband the secret message would be embedded. 3.3.1 RESULTS OF HIDING IMAGE IN IMAGE This is done by using (512×512)pixels of different cover images ,the size of secret images is varied with variable capacity and variable control parameter α. 3.3.1.1 NON-BLIND SYSTEM Table(2)shows the results of the quality of the stego image with the size of the secret image that would be embedded in the cover image.The cover image is lena (512×512) and the secret image is the monaliza for different sizes. Table(2) Stego image results for different size of the secret image with α=0.05 for non blind system Dimension Capacity(%) of the secret image 32*32 0.39 32*64 0.78 64*64 1.56 64*128 3.125 128*128 6.25 128*256 12.5 256*256 25 256*512 50 35 PSNR dB 59.3170 56.2821 53.1136 49.3010 47.5672 46.9269 46.7716 42.1048 N.corr. 1 1 0.9999 0.9998 0.9998 0.9996 0.9992 0.9991 SNR dB 48.1478 45.9236 45.6374 41.2788 36.9841 36.5478 38.3868 33.8184
  • 11. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME Table(3) Results of the stego image for lena as a cover(512*512) and monaliza as a secret image(128*128) for non blind system Stego image α 0.01 0.03 0.05 0.08 0.1 0.13 0.15 0.18 0.2 PSNR dB SNR dB 61.3785 51.9508 47.5672 43.4971 41.5703 39.2936 38.0545 36.4841 35.5842 50.8087 41.4356 36.9841 32.8844 30.9552 28.6760 27.4295 25.4841 24.9989 N.Corr 1 0.9999 0.9998 0.9994 0.9990 0.9983 0.9978 0.9968 0.9961 Extracted image PSNR SNR N.Corr. dB dB 23.1512 14.8374 0.9783 28.2989 20.2329 0.9922 30.1912 21.9307 0.9951 31.1724 22.5636 0.9966 31.4585 22.7344 0.9972 31.8254 22.9192 0.9975 32.0404 23.0317 0.9976 32.2524 23.2396 0.9977 32.1790 23.3350 0.9976 The results in table (3) shows the effects of changing the value of the control parameter (α) on the qualities of the stego image and the extracted image. the stego image the cover image the secret image the extracted image the histogram of the cover image the histogram of the stego image 3000 3000 2500 2500 2000 2000 1500 1500 1000 1000 500 500 0 0 0 50 100 150 200 250 0 50 100 150 200 250 Figure(10) Histogram results of embedding the cover lena(512*512),the secret monaliza (128*128) for non blind system Figure (10) shows the histograms of the original cover and stego image for a cover image with (512*512). One can notice that there is no major change in shape of the histogram. 3.3.1.2 BLIND SYSTEM To test the quality of this system we take many cases such as changing the capacity , changing the values of alpha(α) and comparing to see the quality of both the stego image and the extracted image as in table(4). The cover image is lena.bmp (512×512) and the secret image is peppers.png(256×256). 36
  • 12. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME Table(4) The results of embedding the cover(512×512),the secret (256×256) for blind system Stego image Extracted image N.Corr. α PSNR dB SNR dB N.Corr PSNR dB SNR dB 0.03 43.6193 35.1047 0.9994 17.8763 10.1711 0.9172 0.05 41.8646 33.6388 0.9991 21.6297 13.9355 0.9617 0.08 39.3426 31.0055 0.9983 24.0716 16.4329 0.9828 0.1 37.8269 29.3821 0.9977 24.9989 17.3260 0.9872 0.13 35.9229 27.3669 0.9964 25.6198 17.8824 0.9905 0.15 34.8084 26.1979 0.9953 26.0000 18.2226 0.9918 0.18 33.3595 24.6926 0.9935 26.2630 18.4496 0.9930 0.2 32.5037 23.8084 0.9921 26.3730 18.5350 0.9934 Table(5) The results of embedding variable size on the cover lena (512×512) with α=0.06 and secret image is monaliza with variable size for blind system Dimension of the secret image 32*32 32*64 64*64 64*128 128*128 128*256 256*256 256*512 Capacity(%) PSNR dB N.corr. SNR dB 0.39 0.78 1.56 3.125 6.25 12.5 25 50 58.7759 57.0029 54.3417 53.1702 50.6927 44.3951 42.7789 40.5488 49.4867 47.0876 45.3417 45.3047 41.9723 35.1540 34.4404 33.6906 1 1 0.99994 0.99993 0.99991 0.9995 0.9992 0.9987 Table(5) shows the results of embedding variable size on the cover lena (512×512) with the secret image is monaliza with variable size. To compare with a wavelet –based steganography system by setting L=[0] the size of the secret image is varied to see the difference between the two systems , see table (6) and figure (11).The cover image is lena (512×512) and the cover image is monaliza with α =0.06. Table(6) Embedding in wavelet domain with α =0.06 Dimension of the secret image 32*32 32*64 64*64 64*128 128*128 128*256 256*256 Capacity(%) PSNR dB SNR dB N.corr. 0.39 0.78 1.56 3.125 6.25 12.5 25 55.0306 52.1209 48.2854 45.1342 42.1410 40.1644 37.1554 45.4232 43.5882 36.8436 35.4257 32.7139 33.8576 31.1395 1 0.99991 0.9998 0.9996 0.9991 0.9986 0.9973 37
  • 13. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME 80 PSNR in Contourlet Domain PSNR 60 40 20 PSNR in wavelet Domain 0 0 5 10 15 20 25 30 35 40 45 50 Capacity(%) Figure(11) Comparison between contourlet and wavelet based steganography blind- system ( the cover image is lena(512×512)and the secret image is monaliza with variable size and α =0.06) To evaluate the performance of the proposed system, several simulation have been performed in order to compare its performance with other existing schemes. For hiding image in image a comparison between our proposed method and ref.[18-19] has been showed in table(7),and for testing purposes a cover image is selected to be the lena image (512×512) and hiding capacity is 25% , in[18] which is steganography based on wavelet and integer wavelet domain while in [36] worked on Intermediate Significant Bit Planes. Table (7) Comparison between proposed method and ref.[18-19] Hiding capacity 25% Based on wavelet PSNR dB 41.10 Based on integer wavelet 41.32 Based on intermediate significant bit 37.5516 Proposed method 42.7789 3.3.2 RESULTS OF HIDING TEXT IN AN IMAGE A copy of a text message will be taken with variable size to test the quality of both the stego image and the secret message. The proposed system both kinds blind and non-blind will be implemented . The examples of text messages used in this algorithm are listed in figure (12) the extracted image a- T1 b- T2 Figure (12) Different secret text messages used 3.3.2.1 NON-BLIND SYSTEM Table(8)shows the results of the quality of the stego image according to the size of the secret message that would be embedded in the cover image, Fig.(15)shows the embedding of text message(T2) on the cover image(lena). 38
  • 14. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME Table(8) Results of embedding, the cover (512*512) with different size of secret message for non blind system dimension 32*32 64*64 128*128 128*256 256*256 350*375 365*403 No.of bits 1,024 4,096 16,384 32,768 65,536 131,250 147,095 Stego image PSNR dB 69.3646 63.0397 56.8879 55.0724 47.0590 44.6547 44.5187 Extracted image SNR dB N.Corr 63.2467 46.9229 50.6224 49.0867 37.5902 37.7035 37.8660 1 1 1 1 0.9998 0.9996 0.9996 PSNR dB 51.3682 50.9742 48.6745 45.9783 40.3833 29.3912 29.1718 SNR dB N.Corr. 42.4736 40.7584 35.5143 30.1496 22.3721 17.3222 21.0575 1 1 1 1 0.9997 0.9955 0.9952 Table(9) The effect of beta on the non blind system Stego image β PSNR dB SNR dB N.corr. 5 37.1676 30.8111 0.9973 4 39.1058 32.7493 0.9983 3 41.6046 35.2481 0.9990 2 45.1264 38.7699 0.9996 1 51.1470 44.7905 0.99997 the stego image the stego image the extracted image the secret image Figure (13): Results of embedding the cover (512*512),the secret (350*375) (131,072)bit for non blind system Table (9) shows the effect of changing the value of β on the quality of the system where the cover image is lena (512*512), the secret message is T2(350*375)bit. Figure(13) shows the embedding of text message (T2) on the cover image (lena). Table(10)shows the results of the embedding process for all of the secret message (T1-T2)with size(128*256)bit , the cover is women with(256*256) and β= 0.5. 39
  • 15. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME Table(10) Results of embedding different text massage(128*256) in (256*256)cover image Stego image Secret message T1 T5 Extracted message PSNR db SNR dB N.corr. PSNR dB SNR dB N.corr. 56.8470 56.5772 50.6402 50.3260 1 1 25.8603 42.1442 16.2964 18.0618 0.9932 0.9998 3.3.2.2 BLIND SYSTEM Results of the stego (lena is a cover (512*512)) with different text message with size (256*256) are shown in table(11). If the value of beta is changed, the quality of both the stego and extract message will be affected as shown in table(12),where the cover image is women(256×256)and the secret is T1(128×128). Table(11) Results of embedding different text message(256*256)bit in (512*512)cover image for blind system Stego image Secret message T1 T2 . Extracted message PSNR SNR N.corr. PSNR SNR N.corr. 44.1165 44.1470 35.3251 35.3267 0.9995 0.9993 23.7719 23.2798 12.5742 13.4562 0.9993 0.9995 Table(12) The effect of beta (β)on the stego image for blind system β 5 4 3 2 1 PSNR 39.7947 41.5323 43.6274 46.1686 48.9874 Stego image SNR 0.9984 0.9989 0.9993 40.1294 4.4063 N.corr. 34.5852 36.2457 38.1491 0.9996 0.9998 For a comparison between our proposed method and ref.[7] which is worked on steganography based on Double Density Dual Tree Discrete Wavelet Transform (DD DT DWT). For testing purposes a cover image is selected to be the lena image (512×512) and a secret data is a binary sequence (0, 1) .Table (13) shows the comparison between our proposed system and system in ref. [7]. Table (13) Comparison between our proposed system and system in ref. [7] Ref.[7] Hiding capacity PSNR 5000 bit 38.8541bit 40 Proposed method 56,536 bit 44.1475
  • 16. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME 4. CONCLUSIONS The results obtained for different types of cover images and different types of the secret message, the stego image was obtained with very closed properties to the original cover image so it is so difficult to distinguish between them also a good result for the extracted message was obtained which show robustness of the proposed algorithm to be achieved for data hiding on image. The high capacity requirement conflicts with the high PSNR requirement. Generally speaking, when the capacity increases, the error also increases, and this affects the PSNR, SNR and NC inversely. A trade-off should be made between capacity and these requirements. So the use of the Contourlet Transform can increase the capacity of the secret message up to half the size of the cover image because it provides multiscale and multidirectional. MACM(Modified Arnold Cat Map) increases the security of the system by using the parameters of this chaotic map as a secret key between the transmitter and receiver. The results obtained from the proposed system(when the secret message was an image), when compared with the same system but based on Wavelet , it's clear that the embedding on the Contourlet Domain provides better quality of the stego image up to 3.5dB higher than the system based on wavelet. REFERENCES [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] Shamim Ahmed Laskar, Kattamanchi Hemachandran," Secure Data Transmission Using Steganography and Encryption Technique", International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.3, September, 2012. Firas A. Sabir," Evaluation Of Information Hiding For Still Image", M.Sc.thesis , university of Technology, Baghdad, 2004. Niels Provos and Peter Honeyman," Hide and Seek: An Introduction to Steganography", IEEE Security & Privacy, 540-7993/03, 2003. Michael D. Richard, "Estimation and Detection with Chaotic Systems "Massachusetts Institute of Technology Cambridge, 1994. Hedieh Sajedi ,Mansour Jamzad," Secure steganography based on embedding capacity", Springer-Verlag , International Journal of Information Security, volume 8, Issue 6, pp 433445, 2009. Rosanne English," Comparison of High Capacity Steganography Techniques", IEEE, International Conference of Soft Computing and Pattern Recognition, 978-1-4244-7896-2, 2010. S.K.Muttoo,Sushil Kumar," A Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm" IEEE, 3rd International Conference on Communication Systems Software and Middleware and Workshops, COMSWARE, 2008. Niansheng Liu, Donghui Guo," Multiple Image Information Hiding Technique Based on Chaotic Sequences",IEEE, International Conference on Convergence Information Technology, 0-7695-3038-9/07, 2007. Ying Li, Qiang Zhang, Na Ma,"A Stratified Image-Hiding Method Based on Chaos", IEEE Fifth International Conference,Bio-Inspired Computing: Theories and Applications (BICTA),978-1-4244-6437-1,2010. Mazhar Tayel, Hamed Shawky, Alaa El-Din Sayed Hafez," A New Chaos Steganography Algorithm for Hiding Multimedia Data" , Advanced Communication Technology (ICACT), 14th International Conference on ICACT, Feb. 2012,IEEE. Sreejith.V, Srijith.K, Rajesh Cherian Roy," Robust Blind Digital Watermarking in Contourlet Domain", International Journal of Computer Applications, November 2012. 41
  • 17. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 1, January (2014), © IAEME [12] Hedieh Sajedi, Mansour Jamzad," Using contourlet transform and cover selection for secure steganography", 2010, Springer. [13] Malini Mohan & Anurenjan P.R," A New Algorithm for Data Hiding in Images using Contourlet Transform", IEEE, Recent Advances in Intelligent Computational Systems (RAICS),978-1-4244-9477-4/11,2011. [14] Seyyed Mohammad Reza Farschi · H. Farschi," A novel chaotic approach for information hiding in image", Nonlinear Dyn ,Springer, 2012. [15] Minh N. Do and Martin Vetterli,( Fellow IEEE),"The Contourlet Transform: An Efficient Directional Multiresolution Image Representation", IEEE Transactions On Image Rocessing,Vol.14,No.12, December 2005. [16] Duncan D.-Y. Po and Minh N. Do( Member IEEE) ,"Directional Multiscale Modeling of Images using the Contourlet Transform", Vol.15,Issue 6, IEEE Transactions On Image Processing, 2006. [17] Nagham Salim Mohammed Al-lella ,"Contourlet Transformation for Data Hiding", A Msc Thesis Submitted By , Computer Sciences and Mathematics University of Mosul,2013 [18] Shabir A. Parah, Javaid A. Sheikh" Data Hiding in Intermediate Significant Bit Planes, A High Capacity Blind Steganographic Technique" IEEE, International Conference on Emerging Trends in Science, Engineering and Technology, 978-1-4673-5144-7/12, 2012. [19] K. B. Raja, S. Sindhu, T. D. Mahalakshm," Robust Image Adaptive Steganography using Integer Wavelets", IEEE IMAGE PROCESSING, 2011. [20] Shamim Ahmed Laskar and Kattamanchi Hemachandran, “Steganography Based on Random Pixel Selection for Efficient Data Hiding”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 31 - 44, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [21] Jaspreet Kaur and Chirag Sharma, “Multimodality Medical Image Fusion using Improved Contourlet Transformation with Log Gabor Filters”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 4, Issue 2, 2013, pp. 383 - 389, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. [22] Nagham Hamid, Abid Yahya, R. Badlishah Ahmad and Osamah M. Al-Qershi, “An Improved Robust and Secured Image Steganographic Scheme”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 3, Issue 3, 2012, pp. 22 - 33, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 42