9
International Journal for Science and Emerging ISSN No. (Online):2250-3641 Technologies with Latest Trends” 6(1): 29-37 (2013) ISSN No. (Print): 2277-8136 Transform Domain Analysis of Image Steganography Gurmeet Kaur* and Aarti Kochhar** *Department of Electronics and Communication Engineering, CEM Kapurthala. **Department of Electronics and Communication Engineering, DAVIET Jalandhar (Received 10 April 2013 Accepted 13 April 2013) Abstract: Steganography is a means of data hiding in images for covert transmission. In recent years, Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image. Steganalysis is the technology that attempts to defeat Steganography by detecting the hidden information and extracting. In this paper we propose an image Steganography that can verify the reliability of the information being transmitted to the receiver. This paper is based on the comparison of the DCT and DWT method. This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain. The experimental results show that the algorithm has a high capacity and a good invisibility as compare to DCT. Moreover PSNR of cover image with stego-image shows the better results in comparison with existing Steganography approaches. Also DWT method is best when we have to increase the pay load capacity. Index TermsSteganography, Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT). 1. INTRODUCTION The growing possibilities of modem communications need the special means of security especially on computer network. The network security is becoming more important as the number of data being exchanged on the Internet increases. Therefore, the confidentiality and data integrity are required to protect against unauthorized access. This has resulted in an explosive growth of the field of information hiding area, which encompasses applications such as copyright protection for digital media, Watermarking, fingerprinting, and Steganography. All these applications of information hiding are quite diverse. In watermarking applications, the message contains information such as, owner identification and a digital time stamp, which is usually applied for copyright protection. With fingerprint, the owner of the data set embeds a serial number that uniquely identifies him as the owner. This adds to copyright information and makes it possible to trace any unauthorized usage of the data set. Steganography hides the secret message within the host data set and its presence is imperceptible and is to be reliably communicated to a receiver [1]. The word steganography comes from the Greek Steganos, which means covered or secret and graphy means writing or drawing i.e. Steganography means literally covered writing. With the existing communication methods, Steganography can be used to carry out hidden messages. The main goal of Steganography is to

DCT_algo.pdf

Embed Size (px)

Citation preview

  • International Journal for Science and Emerging ISSN No. (Online):2250-3641 Technologies with Latest Trends 6(1): 29-37 (2013) ISSN No. (Print): 2277-8136

    Transform Domain Analysis of Image Steganography

    Gurmeet Kaur* and Aarti Kochhar**

    *Department of Electronics and Communication Engineering, CEM Kapurthala.

    **Department of Electronics and Communication Engineering, DAVIET Jalandhar

    (Received 10 April 2013 Accepted 13 April 2013)

    Abstract: Steganography is a means of data hiding in images for covert transmission. In recent years, Steganography

    and Steganalysis are two important areas of research that involve a number of applications. These two areas of

    research are important especially when reliable and secure information exchange is required. Steganography is an

    art of embedding information in a cover image without causing statistically significant variations to the cover image.

    Steganalysis is the technology that attempts to defeat Steganography by detecting the hidden information and

    extracting. In this paper we propose an image Steganography that can verify the reliability of the information being

    transmitted to the receiver. This paper is based on the comparison of the DCT and DWT method. This paper presents

    a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover

    image) from spatial domain to frequency domain. The experimental results show that the algorithm has a high

    capacity and a good invisibility as compare to DCT. Moreover PSNR of cover image with stego-image shows the

    better results in comparison with existing Steganography approaches. Also DWT method is best when we have to

    increase the pay load capacity.

    Index TermsSteganography, Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT).

    1. INTRODUCTION The growing possibilities of modem

    communications need the special means of

    security especially on computer network. The

    network security is becoming more important as

    the number of data being exchanged on the

    Internet increases. Therefore, the confidentiality

    and data integrity are required to protect against

    unauthorized access. This has resulted in an

    explosive growth of the field of information hiding

    area, which encompasses applications such as

    copyright protection for digital media,

    Watermarking, fingerprinting, and Steganography.

    All these applications of information hiding are

    quite diverse. In watermarking applications, the

    message contains information such as, owner

    identification and a digital time stamp, which is

    usually applied for copyright protection. With

    fingerprint, the owner of the data set embeds a

    serial number that uniquely identifies him as the

    owner. This adds to copyright information and

    makes it possible to trace any unauthorized usage

    of the data set. Steganography hides the secret

    message within the host data set and its presence is

    imperceptible and is to be reliably communicated

    to a receiver [1].

    The word steganography comes

    from the Greek Steganos, which means covered or

    secret and graphy means writing or drawing i.e.

    Steganography means literally covered writing.

    With the existing communication methods,

    Steganography can be used to carry out hidden

    messages. The main goal of Steganography is to

  • communicate securely in a completely

    undetectable manner and to avoid drawing

    suspicion to the transmission of a hidden data. If a

    Steganography method causes someone to suspect

    there is secret information in a carrier medium,

    then the method become useless. Until recently,

    information hiding techniques received very much

    less attention from the research community and

    from industry than cryptography. Cryptography

    and steganography are widely used in the field of

    data hiding and has received significant attention

    from both industry and academia in the recent

    past. Former conceals the original data but latter

    conceals the very fact that data is hidden.

    Steganography provides high level of secrecy and

    security by combining with cryptography.

    Throughout history Steganography has been used

    to secretly communicate information between

    people.

    2. IMAGE STEGANOGRAPHY

    TECHNIQUES

    Based on the analyses of steganography tools algorithms, we partition these tools into two

    categories:

    Spatial Domain Based Steganography:

    Spatial steganography mainly includes LSB (Least

    Significant Bit) steganography Least significant

    bit (LSB) insertion is a common, simple approach

    to embedding information in a cover image. The

    least significant bit (in other words, the 8th bit) of

    some or all of the bytes inside an image is changed

    to a bit of the secret message.

    Transform Domain Based Steganography:

    Basically there are many kinds of power level

    transforms that exist to transfer an image to its

    frequency domain, some of which are Discrete

    Cosine Transform, KL Transform and Wavelet

    Transform.

    The Discrete Cosine Transform (DCT):

    This method is used, but similar transforms are for

    example the Discrete Fourier Transform (DFT).

    These mathematical transforms convert the pixels

    in such a way as to give the effect of spreading

    the location of the pixel values over part of the

    image [5]. The DCT transforms a signal from an

    image representation into a frequency

    representation, by grouping the pixels into 8 8

    pixel blocks and transforming the pixel blocks into

    64 DCT.

    The Two-Dimensional DCT

    The 2-D DCT is a direct extension of the 1-D case

    and is given by

    Discrete Wavelet Transform

    Wavelets are special functions which (in a form

    analogous to sins and cosines in Fourier analysis)

    are used as basal functions for representing

    signals. The discrete wavelet transform (DWT) we

    applied here is Haar-DWT, the simplest DWT. In

    Haar-DWT the low frequency wavelet coefficient

    30 Kaur and Kochhar

  • are generated by averaging the two pixel values

    and high frequency coefficients are generated by

    taking half of the difference of the same two

    pixels. A signal is passed through a series of filters

    to calculate DWT. Procedure starts by passing this

    signal sequence through a half band digital low

    pass filter with impulse response h (n).Filtering of

    a signal is numerically equal to convolution of the

    tile signal with impulse response of the filter.

    A half band low pass filter removes all frequencies

    that are above half of the highest frequency in the

    tile signal. Then the signal is passed through high

    pass filter.The two filters are related to each other

    as

    For 2-D images, applying DWT (Discrete Wavelet

    Transform) separates the image into a lower

    resolution approximation image or band (LL) as

    well as horizontal (HL), vertical (LH) and

    diagonal (HH) detail components as shown in

    figure.

    Hao-tian Wu, Huang [9] in steganographic

    algorithm is proposed for JPEG Image by

    modifying the block DCT coefficients. Firstly, an

    embedding algorithm called LSB+ matching is

    generated to approximately preserve the marginal

    distribution of DC coefficients. We further divide

    the DCT coefficients into four frequency bands,

    including the direct current (DC), low frequency,

    middle-frequency, and high-frequency. Via matrix

    encoding, low data hiding rate and high

    embedding efficiency are achieved in high-

    frequency band, while the hiding rate is increased

    in the middle-frequency and DC bands, and

    highest in the low-frequency band. In addition, a

    coefficient selection strategy is employed to make

    the hidden message less detectable. The proposed

    algorithm is implemented on a set of 10000

    images and tested with four steganalytic

    algorithms.

    Mamta Juneja, Parvinder Singh Sandhu [11]

    represented Robust image steganography

    technique based on LSB (Least Significant Bit)

    insertion and RSA encryption technique.

    Steganography is the term used to describe the

    hiding of data in images to avoid detection by

    attackers. Steganalysis is the method used by

    attackers to determine if images have hidden data

    and to recover that data. The application discussed

    in this paper ranks images in a users library based

    on their suitability as cover objects for some data.

    By matching data to an image, there is less chance

    Kaur and Kochhar 31

  • of an attacker being able to use steganalysis to

    recover the data. Before hiding the data in an

    image the application first encrypts it. The

    steganography method proposed in this paper and

    illustrated by the application is superior to that

    used by current Steganography tools.

    Yi-zhen Chen, Zhi Han, Shu-ping Li, Chun-hui

    Lu, Xiao-Hui Yao [13] an improved adaptive

    steganography algorithmSVBA algorithm,

    which fully analyzes the statistical properties and

    adopts HVS features. SVBA algorithm first

    divides the image into 8*8 blocks and analyzes the

    mean, variance and entropy value of grey by

    block, then sets a sensitivity vector for each block

    with considering HVS features and adjusts the

    steganography schema dynamically according to

    the block sensitivity vectors. Simulation

    experiment results onMatlab7.0 shows this

    algorithm has a balanced performance on

    efficiency, capacity, imperceptibility and

    robustness. Mohammad Javad Khosravi, Samaneh

    Ghandali [20] novel steganography technique

    based on the combination of a secret sharing

    method and wavelet transform is presented. In this

    method, a secret image is shared into some shares.

    Then, the shares and Fletcher- 16checksum of

    shares are hidden into cover images using an

    integer wavelet based Steganography technique.

    3. MODEL

    A. Definitions

    (i)Cover image: It is defined as the original

    image into which the required information is

    embedded. It is also termed as carrier image. The

    information should be embedded in such a manner

    that there are no significant changes in the

    statistical properties of the cover image.

    (ii)Stegoimage: It is a unified image obtained by

    the combination of the payload and cover image.

    (iii)Perceptibility: It describes the ability of a

    third party (not the intended recipient) to visually

    detect the presence of hidden information in the

    stego image. The embedding algorithm is

    imperceptible when used on a particular image if

    an innocent third party, interested in the content of

    the cover image, is unaware of the existence of the

    payload. Essentially this requires that the

    embedding process not degrade the visual quality

    of the cover image.

    (iv)Robustness: It characterizes the ability of the

    payload to survive the embedding and extraction

    process, even in the face of manipulations of the

    stego image such as filtering, cropping, rotating

    and compression.

    (v)Security: It is inability of adversary to detect

    hidden images accessible only to the authorized

    user. The quality factor can enhance the security

    of the image. A steganographic image is perfectly

    secure when statistical data of the cover and stego

    images are identical

    B. Error Analysis:

    (i) Bit Error Rate: For the successful recovery

    of the hidden information the communication

    channel must be ideal but for the real

    communication channel, there will be error while

    retrieving hidden information and this is measured

    32 Kaur and Kochhar

  • by BER. The cover image is represented as cov

    and stego image as steg in the given equation

    Where i is the pixel position

    (ii) Mean Square Error: It is defined as the square

    of error between cover image and the stego image.

    The distortion in the image can be measured using

    MSE.

    (iii) Peak Signal to Noise Ratio: It is the ratio of

    the maximum signal to noise in the stego image.

    4. ALGORITHMS OF STEGANOGRAPHY

    A.DCT Based Steganography

    Algorithm to embed text message:-

    Step 1: Read cover image.

    Step 2: Read secret message and convert it in

    binary.

    Step 3: The cover image is broken into 88 block

    of pixels.

    Step 4: Working from left to right, top to bottom

    subtract 128 in each block of pixels.

    Step 5: DCT is applied to each block.

    Step 6:Each block is compressed through

    quantization table.

    Step 7: Calculate LSB of each DC coefficient and

    replace with each bit of secret message.

    Step 8: Write stego image.

    Algorithm to retrieve text message:-

    Step 1: Read stego image

    Step 2: Stego image is broken into

    88 block of pixels.

    Step 3:Working from left to right, top to bottom

    subtract 128 in each block of

    pixels.

    Step 4: DCT is applied to each block.

    Step5:Each block is compressed through

    quantization table.

    Step6:Calculate LSB of each DCT coefficient.

    Fig(a) Original Desert Image and Stego image

    Kaur and Kochhar 33

  • Fig (b) Histogram Analysis of Original image

    and Stego Image

    Fig(c) Original Jellyfish Image and Stego

    image

    Fig (d) Histogram Analysis of Original image

    and Stego Image

    B. Wavelet Based Steganography

    Algorithm to embed text message

    Step 1: Read cover image.

    Step 2: Read secret key and convert it in binary.

    Step 3: Perform the DWT and convert the image

    into four sub bands.

    Step 4: Embed the secret key by changing the LSB

    of the each sub band

    Step 5: Generate the stego image.

    Algorithm to retrieve text message:-

    Step 1: Read stego image.

    Step 2: Calculate the IDWT.

    Step 3: Retrieve the message

    34 Kaur and Kochhar

  • Fig(a) Original Jellyfish Image and Stego image

    +

    Fig (b) Histogram Analysis of Original image

    and Stego Image

    Fig(c) Original Jellyfish Image and Stego

    image

    Fig (d) Histogram Analysis of Original image

    and Stego Image

    Kaur and Kochhar 35

  • 5 PERFORMANCE & RESULTS

    The analysis of DCT based and DWT based

    Steganography has been done on basis of

    parameters like PSNR, MSE, Processing time,

    capacity. PSNR computes the peak signal to noise

    ratio, in decibels, between two images. This ratio

    is used as a quality measurement between two

    images. If PSNR ratio is high then images are best

    of quality. Capacity is used to calculate the no of

    bits that can be embedded in the cover image.

    Processing time is the time taken by the MATLAB

    Software to execute the program.

    Method

    Picture

    name

    PSN

    R

    MS

    E

    PROCES

    SING

    TIME

    (seconds)

    Capacity(

    Bits)

    DCT

    (8X8)

    DESER

    T 37.

    54

    11.

    45

    1.95 24576

    DCT(8

    X8)

    JELLT

    FISH 39.

    35

    7.5

    4

    1.63 24576

    DWT DESERT

    49.

    76

    0.6

    8

    1.40 524288

    DWT JELLYFISH

    49.

    85

    0.6

    7

    1.25 524288

    Table1: Simulation results for DCT & DWT

    Method

    6. CONCLUSION

    The Steganography is covert communication to

    protect confidential information. Here we

    presented a comparative study of DCT and the

    DWT Methods. Both come under transform

    domain analysis. Both the methods have good

    imperceptibility and also Robustness against

    statistical attacks. But as we know the major aim

    of the Steganography is to increase the robustness

    against attacks and also to increase the payload

    capacity. Our proposed method increases both the

    PSNR and also the capacity which is less in DCT

    Method.

    REFERENCES

    [1] Anil K Jain, Fundamentals of Digital Image Processing, University of California-Davis, Prentice Hall, 1988

    [2] Ken Cabeen and Peter Gent, Image Compression and Discrete Cosine Transform, College of Redwoods.

    http://online.redwoods.cc.ca.us/instruct/darnold/L

    APROJ/Fall98/PKen/dct.pdf

    [3] Chang, C.C., Chen, T.S. and Chung, L.Z., A steganographic method based upon JPEG and

    quantization table modification, Information Sciences, 2002, 141(1-2), pp.123-38.

    [4]T. Morkel, J.H.P. Eloff , M.S. Olivier,"An

    Overview of Image Steganography," in

    Proceedings of the Fifth Annual Information

    Security South Africa Conference (ISSA2005),

    Sandton, South Africa, June/July 2005 .

    [5] Ankur M. Mehta, Steven Lanzisera, and

    Kristofer S. J. Pister, Steganography 802.15.4 Wireless Communication.

    [6] K Suresh Babu, K B Raja, Kiran Kumar K,

    Manjula Devi T H, Venugopal K R, L M

    Patnaik,Authentication of Secret Information in Image Steganography Microprocessor Applications Laboratory, Indian Institute of

    Science,Bangalore

    [7] Proceedings of the 2006 International

    Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP'06)0-7695-2745-0/06 2006 IEEE.

    [8] Asghar Shahrzad Khashandarag and Naser

    Ebrahimian, A new method for color image steganography using SPIHT and DCT, sending

    with JPEG format, International Conference on Computer Technology and Development, IEEE,

    2008

    [9] CHEN Zhi-li, HUANG Liu-sheng, YU Zhen-

    shan, LI Ling-jun and YANG wei, A Statistical Algorithm for Linguistic Steganography Detection

    Based on Distribution of Words, 3RD International

    36 Kaur and Kochhar

  • Conference on Availability, Reliability and

    Security, IEEE, 2008. .

    [10] K Suresh Babu, K B Raja, Kiran Kumar K,

    Manjula Devi T H, Venugopal K R, L M Patnaik,

    Authentication of Secret Information in Image Steganography Microprocessor Applications Laboratory, Indian Institute of Science, Bangalore

    in 2008

    [11] Mamta Juneja Parvinder Singh Sandhu,

    Designing of Robust Image Steganography Technique Based on LSB Insertion and

    Encryption 2009 International Conference on Advances in Recent Technologies in

    Communication and Computing.

    [12] KokSheik Wong, Xiaojun Qi, and Kiyoshi

    Tanaka, A DCT based Mod4 Steganography Method Signal Processing 87, 1251-1263, 2009.

    [13] Yi- Zhen Chen, Zhi Han, Shu-ping Li, Chun-

    hui Lu, Xiao- Hui Yao , An Adaptive Steganography Algorithm Based on Block

    Sensitivity Vectors Using HVS Features 2010 3rd International Congress on Image and Signal

    Processing.

    [14] James Cane, TheoYi- zhen Chen, Zhi Han,

    Shu-ping Li, Chun- hui Lu, Xiao- Hui Yao , An Adaptive Steganography Algorithm Based on

    Block Sensitivity Vectors Using HVS Feature 2010 3rd International Congress on Image and

    Signal Processing.

    [15]. Adel Almohammad, Gheorghita Ghinea,

    Image Steganography and Chrominance Components 2010 10th IEEE International Conference on Computer and Information

    Technology (CIT 2010)

    [16] Jinsuk Baekl, Cheonshik Kim, Paul S.

    Fisherl, and Hongyang Cha0, (N. 1) Secret Sharing Approach Based on Steganography with

    Gray Digital Images. 978-1-4244-5849-3/10/ 20 1 0 IEEE

    [17] Suhaila Abd Halim and Muhammad Faiz

    Abdullah Sani , Embedding Using Spread Spectrum ImageSteganography with

    GF)Proceedings of the 6th IMT-GT Conference on Mathematics, Statistics and its Applications

    (ICMSA2010)

    [18] Tetsuya Kojima , Yoshiya Horii , A Steganography Based on CT-CDMA

    Communication SchemeUsing Complete

    Complementary Codes arXiv:1001.2623v1 [cs.IT] 15 Jan 2010

    [19] T. Morkel, J.H.P. Eloff, M.S. Olivier,

    Information and Computer Security Architecture (ICSA) Research Group.

    [20] Edward Neuman, MATLA B Tutorials, Department of Mathematics, Board of Trustees,

    Southem Illinois Universit

    Kaur and Kochhar 37