SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications
                             (IJERA) ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, June-July 2012, pp.751-755
     A High Capacity Data Hiding Method for JPEG2000 Compression
                                System
                              Arjun Nichal*, Dr. Shraddha Deshpande**
                           *(Department of Electronics, Walchand College of Engineering, Sangli,
                                                Maharashtra 416415, India
                          ** (Department of Electronics, Walchand College of Engineering, Sangli,
                                                Maharashtra 416415, India


ABSTRACT
         Data hiding is an important branch of                 method is used [5]-[6]. Redundancy evaluation method
information security. Imperceptibility and Hiding              determines embedding depth adaptively for increasing
Capacity are very important aspects for efficient secret       hiding capacity. A candidate embedding point will be
communication. It is necessary to increase hiding              removed if evaluated quantization redundancy is less than
capacity for JPEG2000 baseline system because                  two. For security purpose secret message is encrypted by
available redundancy is very limited. In this paper            using encryption key. At decoder side exact inverse
Redundancy Evaluation method is used for increasing            procedure is used for extraction of secret message.
hiding capacity. This method determines embedding
depth adaptively for increasing hiding capacity. Large         I. SECRET MESSAGE EMBEDDING ALGORITHM
quantity of data is embedded into bitplanes, but at the        This message embedding algorithm uses redundancy
cost of slightly change in Peak Signal to Noise Ratio          evaluation method for increasing hiding capacity.
(PSNR). This method easily implemented in JPEG2000             Quantized secret message embedded wavelet coefficients
compression encoder and produced stego stream                  compressed by using JPEG2000 compression baseline
decoded normally at decoder. Simulation result shows           system. Secret message is encrypted by using secret
that this method is secure and increases hiding capacity.      encryption key. Same secret encryption key is used at
                                                               decoder side for extraction of secret message
Keywords - Secret communication, JPEG2000, Data                                DWT          Quantization     Redundancy
hiding, Information security, PSNR.                                                                          Evaluation
                                                               Cover Image

INTRODUCTION                                                                         Key Processing
         Information hiding in digital images has drawn        Secret Image
                                                                                         Block
much attention in recent years. Secret message encrypted
                                                                                                               Message
and embedded in digital cover media. The redundancy of
                                                                                     Secret Key             Embedding Block
digital media as well as characteristics of human visual
system makes it possible to hide secret messages. Two
competing aspects are considered while designing                                                                 EBCOT
information hiding scheme 1) Hiding capacity and 2)                                                              Encoder
Imperceptibility. Hiding capacity means maximum payload.
Imperceptibility means keeping undetectable [1].
                                                                                                              Codestrem
         A least significant bits (LSB) substitution method
is widely used for hiding data in digital images. This              Fig. 1 Secret message embedding block diagram
method widely used because of large capacity and easy
implementation. This kind of secret data embedding             1.1 Discrete Wavelet Transform
approach carried out in image pixel and quantized discrete     Cover image is decomposed by using discrete wavelet
cosine transform (DCT) [2]-[3]. In JPEG compression            transform up to certain level.
system secure data hiding scheme achieved by modifying
quantized DCT coefficients. A DCT domain data hiding           1.2 Quantization
scheme can be applied in JPEG very conveniently. A             Uniform scalar quantizer is used for quantization purpose.
JPEG2000 international coding standard is based on
                                                                                                  𝑦 𝑏 [𝑛]
discrete wavelet transform. Some data hiding schemes                      𝑞 𝑏 𝑛 = 𝑠𝑖𝑔𝑛(𝑦 𝑏 [𝑛])                            (1)
                                                                                                   ∆𝑏
cannot fitted to JPEG2000 compression system directly. All
secret data will be destroyed because of truncating
                                                               Here 𝑦 𝑏 [𝑛] denotes the sample of subbands, while 𝑞 𝑏 [𝑛]
operation if it is embedded into lowest bitplanes [4]. For
                                                               denotes the quantization indices and ∆ 𝑏 denotes the step
JPEG2000 compression standard limited redundancy and
                                                               size.
bitstream truncation makes it difficult to hide information.
To overcome these two problems redundancy evaluation

                                                                                                              751 | P a g e
Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications
                             (IJERA) ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, June-July 2012, pp.751-755
1.3 Redundancy Evaluation                                                          1.4 Key Processing Block
          The redundancy of uniform quantization is                                         In this step secret image is encrypted by using
determined according to the visual masking effect and                              secret key. Encryption process hides the contents of the
brightness sensitivity of human visual system. The                                 information whereas stegnography hides existence of the
calculation of self- contrast masking effect, neighborhood                         information. Suppose 𝑚 𝑖 is a secret data and 𝑛 𝑖 is a secret
masking effect and local brightness weighting factor is                            key, then final encrypted data will be,
calculated as follows. In the first step self-contrast masking
effect is calculated,                                                                         𝐸𝑛𝑐𝑟𝑦𝑝𝑡𝑒𝑑 𝑑𝑎𝑡𝑎 = 𝑚 𝑖 ⊕ 𝑛 𝑖                           (8)
                                                          ⍺                        1.5 Message Embedding Block
                     𝑦 𝑖 = 𝑠𝑖𝑔𝑛( 𝑥 𝑖 ) 𝑥 𝑖 . 𝛥 𝑖                             (2)
                                                                                            In this message embedding block message is
Where 𝑥 𝑖 is the quantized wavelet coefficient with bits                           embedded adaptively in quantized wavelet coefficient. First
lower than highest no-zero bit are replaced by zeros. 𝛥 𝑖 is                       threshold assigned for embedding process. Wavelet
quantization step. Parameter ⍺ takes value between 0 and 1.                        coefficients greater than given threshold are chosen as
Result of first step is𝑦 𝑖 . In second step neighborhood                           candidate embedding point. Threshold calculated as
masking is calculated                                                              follows.
                                        𝑦𝑖
              𝑧𝑖 =                                                           (3)            𝑇𝑕𝑟𝑒𝑠𝑕𝑜𝑙𝑑 = 2 𝑛       𝑤𝑕𝑒𝑟𝑒 𝑛 = 4,5,6,7                (9)
                     1+(𝑎   𝑘⋳ 𝑛𝑒𝑖𝑔 𝑕 𝑏𝑜𝑟 𝑕 𝑜𝑜𝑑       𝑥 𝑘 𝛽 )/ ɸ 𝑖

                                                                                   Next step is to calculate lowest embed allowed bitplane.
         The symbol 𝑥 𝑘 denotes the neighboring wavelet
                                                                                   This can be calculated by using following formula.
coefficients greater than or equal to 16 and its bits lower
than highest no-zero are replaced by zeros. Symbol ɸ 𝑖 is                                                              log (𝑡𝑕𝑟𝑒𝑠 𝑕𝑜𝑙𝑑 )
number of wavelet coefficient in neighborhood. Parameter                                  𝐿𝑜𝑤𝑒𝑠𝑡 𝑒𝑚𝑏𝑒𝑑 𝑏𝑖𝑡𝑝𝑙𝑎𝑛𝑒 =                          −1     (10)
                                                                                                                            log (2)
β assumes value between 0 and 1. Parameter 𝑎 is a
normalization factor and having constant value 𝑎 =                                          Bitplanes lower than lowest embed allowed
(10000/2 𝑑−1 ) 𝛽 . d is a bit depth of image component. In                         bitplanes are truncated during compression process.
third step weighting factor about brightness sensitivity is                        Now suppose value of threshold is 16. Four wavelet
calculated.                                                                        coefficients A, B, C and D having values 33, 65, 9 and 128
                                                                                   respectively. Coefficient C cannot chosen for embedding
                      2 − 𝐿 𝑙, 𝑖, 𝑗 ,          𝑖𝑓 𝐿 𝑙, 𝑖, 𝑗 < 1                    process because its value is less than threshold. Lowest
       Ʌ 𝑙, 𝑖, 𝑗 =                                                           (4)
                        𝐿 𝑙, 𝑖, 𝑗 ,              𝑂𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒                         embed allowed bitplane is 3. Now after calculation of
                                                                                   redundancy, result for wavelet coefficients A, B and D as
                         1                      𝑖                      𝑗           follows.
      𝐿 𝑙, 𝐼, 𝐽 = 1 +       𝐼𝑘    1+                   ,1 +                  (5)
                        128 0                 2 𝑘−1                  2 𝑘−1

Ʌ 𝑙, 𝑖, 𝑗 is a local brightness weighting factor. The symbol                             𝑟 𝐴 = 1.59           𝑟 𝐵 = 2.60          𝑟 𝐷 = 12.5
𝐼 𝑙 𝜃 denotes the sunband at resolution level 𝑙 ⋳ 0,1, … . . 𝑘
and with orientation 𝜃 ⋳ 𝐿𝐿, 𝐿𝐻, 𝐻𝐿, 𝐻𝐻 . The symbol
𝐼 𝑙 𝜃 (𝑖, 𝑗) denotes the wavelet coefficient located at (𝑖, 𝑗) in
subband 𝐼 𝑙 𝜃 . The level of discrete wavelet decomposition is
 𝑘. The result of next step is
                                  𝑧𝑖
                           𝑧 ′𝑖 =                             (6)
                                  Ʌ(𝑙,𝑖,𝑗 )

Final quantization redundancy is calculated by using
following equation.
                             𝑥
                        𝑟𝑖 = ′𝑖                  (7)
                                       𝑧𝑖
          The redundancy of wavelet coefficient 𝑥 𝑖 can be
measured by 𝑟𝑖 , for avoiding degradation of image we use
wavelet coefficients with 𝑟𝑖 not less than 2 to carry                                         Fig. 2 Candidate Embedding Points
message bits.The rules of adjusting embedding points and
intensity is as follows.                                                           Value of 𝑟 𝐴 is less than 2 . Wavelet coefficient 𝐴 cannot be
                                                                                   used for embedding process.
    1) If 𝑟𝑖 < 2, then embedding point should be
        removed.                                                                   Value of 𝑟 𝐵 is greater than 2. 21 < 2.60 < 22 so the
    2) If 2 𝑛 ≤ 𝑟𝑖 < 2 𝑛+1 then embedding capacity of this                         embedding capacity of coefficient 𝐵 is 1 bit.
        point is determined by 𝑛 bits.
The final 𝑛 𝑖 is the adaptive embedding depth for each                             Value of    𝑟 𝐷 is greater than 2. 23 < 12.5 < 24            so the
quantized wavelet coefficient 𝑥 𝑖 .                                                embedding capacity of coefficient 𝐷 is 3 bits.

                                                                                   In next step encrypted bits are embedded into selected
                                                                                   wavelet coefficients adaptively.
                                                                                                                                      752 | P a g e
Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications
                             (IJERA) ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, June-July 2012, pp.751-755
                                                               III. QUALITY PARAMETERS
                                                                      For comparing With Redundancy Evaluation
                                                               Method and Without Redundancy Evaluation Method we
                                                               have considered various quality parameters such as
                                                               Compression Ratio (CR), Peak Signal to Noise Ratio
                                                               (PSNR) and Embedding Capacity (EC).

                                                               3.1 Compression Ratio (CR)
                                                               The compression ratio is calculated as the ratio of number
                                                               of bits required to represent original image to the number of
                                                               bits required to represent compressed codestream.

                                                                                   Number of bits required to
                                                                                    represent original image
      Fig. 3 Adjusted embedding points and intensity                    𝐶𝑅 =       Number of bits required to               (12)
1.6 Embedded Block Coding and Optimized Truncation                             represent compressed codestream
(EBCOT) Encoder
         After message embedding process message               3.2 Peak-Signal to Noise Ratio (PSNR)
embedded quantized subbands are encoded by using               The PSNR is calculated by using following formula.
Embedded Block coding and optimized truncation
                                                                                                       𝑀𝐴𝑋 2
(EBCOT) encoder. EBCOT encoder is used in JPEG2000                           𝑃𝑆𝑁𝑅 = 10𝑙𝑜𝑔10                𝐼
                                                                                                                            (13)
                                                                                                       𝑀𝑆𝐸
baseline system for encoding purpose. Three coding passes                                 𝑚 −1 𝑛−1
are used in EBCOT encoder 1) Significance propagation                               1                                   2
                                                                           𝑀𝑆𝐸 =                     𝐼 𝑖, 𝑗 − 𝐾(𝑖, 𝑗)
pass 2) Magnitude refinement pass 3) Clean-up pass. These                           𝑚𝑛
                                                                                          𝑖=0 𝑗 =0
three coding passes are used for encoding purpose. Final
output of this EBCOT encoder block is one dimensional          Where 𝑀𝐴𝑋 𝐼 is maximum possible pixel value of
codestream.                                                    image 𝐼 𝑖, 𝑗 . 𝑀𝑆𝐸 is a mean square error. 𝐼 𝑖, 𝑗 is a
                                                               original cover image.    𝐾(𝑖, 𝑗) is a reconstructed cover
II. SECRET MESSAGE EXTRACTION ALGORITHM                        image. 𝑚 is number of rows and 𝑛 is number of columns.
Extraction process is simply inverse process to that of
embedding process.                                             3.3 Embedding Capacity (EC)
                                                               Embedding capacity is calculated by using following
Codestream                                                     formula.
                                                                                            𝑛   𝑚
          Codestream       Redundancy
           decoder         Evaluation                                              𝐸𝐶 =              𝑛 𝑖, 𝑗
                                                                                          𝑖=1 𝑗 =1


                                        Message Extraction
                                                                                    𝑖𝑓 x 𝑖, 𝑗 > 𝑇𝑕𝑟𝑒𝑠𝑕𝑜𝑙𝑑                   (14)
                                                               x 𝑖, 𝑗 is a quantized wavelet coefficient matrix.

                 Secret Key         Extracted        IDWT      IV. EXPERIMENTAL RESULTS AND DISCUSSIONS
                                      Data                              In this paper binary secret image is embedded into
                                                               grayscale cover image. Image into image steganography
                                                               scheme is to be carried out. Some standard grayscale
                                 Rec. Secret     Rec. cover    images are used as a cover images. With Redundancy
                                   Image           Image       Evaluation Method and Without Redundancy Evaluation
                                                               Method are compared on the basis of various performance
        Fig. 4 Secret message extraction algorithm             parameters such as Compression Ratio (CR), Peak Signal to
Codestream is the input for secret message extraction          Noise Ratio (PSNR) and Embedding Capacity (EC).
algorithm. Output of the codestream decoder is a subbands.     Lena image having size 512*512 is used for processing.
After codestream decoder redundancy is to be evaluated as
described in secret message embedding algorithm. By using
quantization redundancy matrix 𝑟𝑖 embedded secret bits are
extracted from subbands. Extracted secret bits are encrypted
bits. So original secret image recovered by using following
formula.
                𝑚 𝑖 = 𝐸𝑛𝑐𝑟𝑦𝑝𝑡𝑒𝑑 𝑑𝑎𝑡𝑎 ⊕ 𝑛 𝑖              (11)

Where 𝑚 𝑖 is a recovered secret image and 𝑛 𝑖 is encryption
key. Encryption key used at embedding operation and
extraction operation are same. Inverse discrete wavelet                    (a)                           (b)
transform (IDWT) is used for recovering cover image                Fig. 5 (a) Original Lena Image, (b) Secret Image
                                                                                                                   753 | P a g e
Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications
                             (IJERA) ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, June-July 2012, pp.751-755
           Now with compression rate 0.5, Decomposition              14000
level 5 and threshold 32 determined embedding capacity of
                                                                                       With Red. Evaluation
Lena image is 5575 bits. 5476 bits embedded in Cover                 12000
image Lena with compression ratio 15.9959. At decoder                                  Without Red. Evaluation
side same parameters used for extraction of secret message.          10000
After decoding process value of PSNR is 34.2839db. Only
the first, Second and third decomposition levels are used to          8000
embed secret messages. The forth and fifth decomposition
level contains important low frequency components that                6000
cannot modified to hide secret messages.
                                                                      4000

                                                                      2000

                                                                         0
                                                                             0         0.2        0.4         0.6      0.8         1
                                                                                                                                       .
                                                                     Fig. 7 Compression rate Vs Embedding Capacity

                                                               Compression rate Vs embedding capacity is plotted for both
                                                               With and Without Redundancy Evaluation method.
              (a)                          (b)
    Fig. 6 (a) Reconstructed Lena Image, (b) Retrieved
                                                                     16000
                       Secret Image
                                                                                                   With Red. Evaluation
                                                                     14000
 Table 1: Results for Lena image with diff. compression                                            Without Red. Evaluation
            rate and common threshold = 32                           12000
                                   Without
         With Redundancy                                             10000
 C.                              Redundancy          C.
            Evaluation
Rate                              Evaluation        Ratio            8000

         EC     NBE    PSNR     EC    NBE PSNR                       6000
0.2    1482     1444   30.973 741     676    31.217 39.974
                                                                     4000
0.4    4092     3844   33.522 2045 1936 34.322 19.993
                                                                     2000
0.6    7129     7056   35.065 3564 3364 36.154 13.330
                                                                        0
0.8    10094 10000 36.328 5049 4900 37.446 9.998
                                                                                  16             32              64          128
1      13021 12996 37.263 6515 6400 38.414 7.998                                                                                       .
                                                                         Fig. 7 Threshold Vs Embedding Capacity

                                                               Threshold Vs Embedding capacity (EC) plotted for both
C. Rate is a compression rate, EC is a embedding Capacity,     With as well as Without Redundancy Evaluation Method.
NBE is number of bits embedded, PSNR is Peak Signal to
Noise Ratio and C. Ratio is a Compression Ratio.
                                                               V. CONCLUSION
    Table 2: Results of Lena Image with diff. Thresholds                Results produced with With Redundancy
            and common compression rate = 0.5.                 Evaluation method yields in large embedding capacity than
                                                               Without Redundancy Evaluation method. Without changing
    Threshold     EC of With RE       EC of Without RE         much image quality maximum secret data is to embedded.
                                                                        Redundancy      evaluation  method     increases
       16              13452                 6725              Embedding capacity (EC) at the cost of slight change in
                                                               Peak Signal to Noise Ratio (PSNR).
       32              5574                  2787                       This effort gives comprehensive study of image
       64              1915                   957              steganography for JPEG2000 baseline system with variety
                                                               of quality parameters.
       128              420                   210

EC of With RE means Embedding capacity With
                                                               REFERENCES
redundancy evaluation and EC of Without RE means               [1]           N. Proves and P. Honeyman, “Hide and seek: An
Embedding Capacity of Without Redundancy Evaluation.                         introduction to Steganography,” IEEE Security
                                                                             and Privacy Mag., vol. 1, no. 3, pp. 32-44, 2003.
                                                                                                                      754 | P a g e
Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications
                             (IJERA) ISSN: 2248-9622 www.ijera.com
                              Vol. 2, Issue 4, June-July 2012, pp.751-755

[2]   H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang,
      “Image steganographic scheme based on pixel-
      value differencing and LSB replacement
      methods,” IEE Proc. Vis., Image , Signal Process.,
      vol. 152, no.5, pp. 611–615, Oct. 2005.

[3]   C. K. Chan and L. M. Cheng, “Hiding data in
      images by simple LSB substitution,” Pattern
      Recognit., vol. 37, no. 3, pp. 469–474, 2004.

[4]   JPEG2000 Part 1: Final Committee Draft Version
      1.0, ISO/IEC. FCD 15444-1, 2000.

[5]   P. C. Su and C. C. J. Kuo, “Steganography in
      JPEG2000 compressed images,” IEEE Trans.
      Consum. Electron., vol. 49, no. 4, pp. 824–832,
      Apr. 2003.

[6]   Liang Zhang, Haili Wang and Renbiao Wu, “A
      high capacity stegnography scheme for JPEG2000
      baseline system,” IEEE Transactions on Image
      Processing, vol. 18, no. 8, August 2009.




                                                                                         755 | P a g e

Más contenido relacionado

La actualidad más candente

A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELijcsit
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageijctet
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingijctet
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTCSCJournals
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitutionijsrd.com
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475IJRAT
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptographyAlexander Decker
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmIJARIDEA Journal
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...eSAT Journals
 
Discrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyDiscrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyKaushik Chakraborty
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet TransformIRJET Journal
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34Alexander Decker
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER PublishesAmAl C
 

La actualidad más candente (17)

A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNELA NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
A NOVEL PERCEPTUAL IMAGE ENCRYPTION SCHEME USING GEOMETRIC OBJECTS BASED KERNEL
 
Cecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in imageCecimg an ste cryptographic approach for data security in image
Cecimg an ste cryptographic approach for data security in image
 
40120140505005
4012014050500540120140505005
40120140505005
 
40120140505005 2
40120140505005 240120140505005 2
40120140505005 2
 
A robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarkingA robust combination of dwt and chaotic function for image watermarking
A robust combination of dwt and chaotic function for image watermarking
 
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWTSteganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
Steganography using Coefficient Replacement and Adaptive Scaling based on DTCWT
 
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel SubstitutionImage Encryption Based on Pixel Permutation and Text Based Pixel Substitution
Image Encryption Based on Pixel Permutation and Text Based Pixel Substitution
 
Paper id 25201475
Paper id 25201475Paper id 25201475
Paper id 25201475
 
11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography11.biometric data security using recursive visual cryptography
11.biometric data security using recursive visual cryptography
 
Image Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic AlgorithmImage Steganography Based On Non Linear Chaotic Algorithm
Image Steganography Based On Non Linear Chaotic Algorithm
 
Steganography
Steganography Steganography
Steganography
 
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
[IJET V2I2P23] Authors: K. Deepika, Sudha M. S., Sandhya Rani M.H
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Discrete Cosine Transform Stegonagraphy
Discrete Cosine Transform StegonagraphyDiscrete Cosine Transform Stegonagraphy
Discrete Cosine Transform Stegonagraphy
 
IRJET - Steganography based on Discrete Wavelet Transform
IRJET -  	  Steganography based on Discrete Wavelet TransformIRJET -  	  Steganography based on Discrete Wavelet Transform
IRJET - Steganography based on Discrete Wavelet Transform
 
3 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-343 rupali kasar_final paper--23-34
3 rupali kasar_final paper--23-34
 
IJAER Publishes
IJAER PublishesIJAER Publishes
IJAER Publishes
 

Destacado

Uso racional da vitamina c 18 03-2013
Uso racional da vitamina c 18 03-2013Uso racional da vitamina c 18 03-2013
Uso racional da vitamina c 18 03-2013Maria Da Gloria
 
Estudo de comparativo nutriak Akmos
Estudo de comparativo nutriak AkmosEstudo de comparativo nutriak Akmos
Estudo de comparativo nutriak Akmosakmoscadastro
 
ACCESO ABIERTO AL CONOCIMIENTO: BIBLIOTECA VIRTUAL DEL CGIAR
ACCESO ABIERTO AL CONOCIMIENTO: BIBLIOTECA VIRTUAL DEL CGIARACCESO ABIERTO AL CONOCIMIENTO: BIBLIOTECA VIRTUAL DEL CGIAR
ACCESO ABIERTO AL CONOCIMIENTO: BIBLIOTECA VIRTUAL DEL CGIARRIBDA 2009
 
San placido y_alemanes
San placido y_alemanesSan placido y_alemanes
San placido y_alemanesCCOBAEZA
 
E‐LIS en Brasil: estado actual y perspectivas futuras
E‐LIS en Brasil: estado actual y perspectivas futurasE‐LIS en Brasil: estado actual y perspectivas futuras
E‐LIS en Brasil: estado actual y perspectivas futurasRIBDA 2009
 
Plantas y arboles.
Plantas y arboles.Plantas y arboles.
Plantas y arboles.smilefel
 
Humanismo y renacimiento
Humanismo y renacimientoHumanismo y renacimiento
Humanismo y renacimientoelgranlato09
 

Destacado (20)

Kf2417451751
Kf2417451751Kf2417451751
Kf2417451751
 
Jw2417001703
Jw2417001703Jw2417001703
Jw2417001703
 
Jc2415921599
Jc2415921599Jc2415921599
Jc2415921599
 
Jn2416531655
Jn2416531655Jn2416531655
Jn2416531655
 
Kn2417861791
Kn2417861791Kn2417861791
Kn2417861791
 
Ks2418141819
Ks2418141819Ks2418141819
Ks2418141819
 
Ka2417181721
Ka2417181721Ka2417181721
Ka2417181721
 
Bu24478485
Bu24478485Bu24478485
Bu24478485
 
Ir2415241528
Ir2415241528Ir2415241528
Ir2415241528
 
Cj24566573
Cj24566573Cj24566573
Cj24566573
 
Et31962968
Et31962968Et31962968
Et31962968
 
Uso racional da vitamina c 18 03-2013
Uso racional da vitamina c 18 03-2013Uso racional da vitamina c 18 03-2013
Uso racional da vitamina c 18 03-2013
 
Estudo de comparativo nutriak Akmos
Estudo de comparativo nutriak AkmosEstudo de comparativo nutriak Akmos
Estudo de comparativo nutriak Akmos
 
ACCESO ABIERTO AL CONOCIMIENTO: BIBLIOTECA VIRTUAL DEL CGIAR
ACCESO ABIERTO AL CONOCIMIENTO: BIBLIOTECA VIRTUAL DEL CGIARACCESO ABIERTO AL CONOCIMIENTO: BIBLIOTECA VIRTUAL DEL CGIAR
ACCESO ABIERTO AL CONOCIMIENTO: BIBLIOTECA VIRTUAL DEL CGIAR
 
San placido y_alemanes
San placido y_alemanesSan placido y_alemanes
San placido y_alemanes
 
E‐LIS en Brasil: estado actual y perspectivas futuras
E‐LIS en Brasil: estado actual y perspectivas futurasE‐LIS en Brasil: estado actual y perspectivas futuras
E‐LIS en Brasil: estado actual y perspectivas futuras
 
Introdução
IntroduçãoIntrodução
Introdução
 
Jesucristo1pal
Jesucristo1palJesucristo1pal
Jesucristo1pal
 
Plantas y arboles.
Plantas y arboles.Plantas y arboles.
Plantas y arboles.
 
Humanismo y renacimiento
Humanismo y renacimientoHumanismo y renacimiento
Humanismo y renacimiento
 

Similar a Dr24751755

IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET Journal
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...IRJET Journal
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET Journal
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemIRJET Journal
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachIJERA Editor
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET Journal
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeiaemedu
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESIRJET Journal
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementIRJET Journal
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationIJTET Journal
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...IOSR Journals
 
Robust video data hiding using forbidden zone
Robust video data hiding using forbidden zoneRobust video data hiding using forbidden zone
Robust video data hiding using forbidden zoneMadonna Ranjini
 

Similar a Dr24751755 (20)

IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching AlgorithmIRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
IRJET-Data Embedding Method using Adaptive Pixel Pair Matching Algorithm
 
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
Designing secured data using a combination of JPEG2000 Compression, RSA Encry...
 
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
IRJET- Efficient Data Hiding with LZW Compression and Ecc Encryption for Secu...
 
Ijetcas14 527
Ijetcas14 527Ijetcas14 527
Ijetcas14 527
 
Protection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based SystemProtection of Secret Textual Data Using Steganography Based System
Protection of Secret Textual Data Using Steganography Based System
 
92 97
92 9792 97
92 97
 
92 97
92 9792 97
92 97
 
RSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT ApproachRSA Based Secured Image Steganography Using DWT Approach
RSA Based Secured Image Steganography Using DWT Approach
 
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
 
An improved robust and secured image steganographic scheme
An improved robust and secured image steganographic schemeAn improved robust and secured image steganographic scheme
An improved robust and secured image steganographic scheme
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular FormSurvey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
 
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUESADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
ADVANCED SECURITY USING ENCRYPTION, COMPRESSION AND STEGANOGRAPHY TECHNIQUES
 
Reversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast EnhancementReversible Image Data Hiding with Contrast Enhancement
Reversible Image Data Hiding with Contrast Enhancement
 
Comparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure CommunicationComparative Study on Watermarking & Image Encryption for Secure Communication
Comparative Study on Watermarking & Image Encryption for Secure Communication
 
call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...call for papers, research paper publishing, where to publish research paper, ...
call for papers, research paper publishing, where to publish research paper, ...
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
 
Robust video data hiding using forbidden zone
Robust video data hiding using forbidden zoneRobust video data hiding using forbidden zone
Robust video data hiding using forbidden zone
 

Dr24751755

  • 1. Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, June-July 2012, pp.751-755 A High Capacity Data Hiding Method for JPEG2000 Compression System Arjun Nichal*, Dr. Shraddha Deshpande** *(Department of Electronics, Walchand College of Engineering, Sangli, Maharashtra 416415, India ** (Department of Electronics, Walchand College of Engineering, Sangli, Maharashtra 416415, India ABSTRACT Data hiding is an important branch of method is used [5]-[6]. Redundancy evaluation method information security. Imperceptibility and Hiding determines embedding depth adaptively for increasing Capacity are very important aspects for efficient secret hiding capacity. A candidate embedding point will be communication. It is necessary to increase hiding removed if evaluated quantization redundancy is less than capacity for JPEG2000 baseline system because two. For security purpose secret message is encrypted by available redundancy is very limited. In this paper using encryption key. At decoder side exact inverse Redundancy Evaluation method is used for increasing procedure is used for extraction of secret message. hiding capacity. This method determines embedding depth adaptively for increasing hiding capacity. Large I. SECRET MESSAGE EMBEDDING ALGORITHM quantity of data is embedded into bitplanes, but at the This message embedding algorithm uses redundancy cost of slightly change in Peak Signal to Noise Ratio evaluation method for increasing hiding capacity. (PSNR). This method easily implemented in JPEG2000 Quantized secret message embedded wavelet coefficients compression encoder and produced stego stream compressed by using JPEG2000 compression baseline decoded normally at decoder. Simulation result shows system. Secret message is encrypted by using secret that this method is secure and increases hiding capacity. encryption key. Same secret encryption key is used at decoder side for extraction of secret message Keywords - Secret communication, JPEG2000, Data DWT Quantization Redundancy hiding, Information security, PSNR. Evaluation Cover Image INTRODUCTION Key Processing Information hiding in digital images has drawn Secret Image Block much attention in recent years. Secret message encrypted Message and embedded in digital cover media. The redundancy of Secret Key Embedding Block digital media as well as characteristics of human visual system makes it possible to hide secret messages. Two competing aspects are considered while designing EBCOT information hiding scheme 1) Hiding capacity and 2) Encoder Imperceptibility. Hiding capacity means maximum payload. Imperceptibility means keeping undetectable [1]. Codestrem A least significant bits (LSB) substitution method is widely used for hiding data in digital images. This Fig. 1 Secret message embedding block diagram method widely used because of large capacity and easy implementation. This kind of secret data embedding 1.1 Discrete Wavelet Transform approach carried out in image pixel and quantized discrete Cover image is decomposed by using discrete wavelet cosine transform (DCT) [2]-[3]. In JPEG compression transform up to certain level. system secure data hiding scheme achieved by modifying quantized DCT coefficients. A DCT domain data hiding 1.2 Quantization scheme can be applied in JPEG very conveniently. A Uniform scalar quantizer is used for quantization purpose. JPEG2000 international coding standard is based on 𝑦 𝑏 [𝑛] discrete wavelet transform. Some data hiding schemes 𝑞 𝑏 𝑛 = 𝑠𝑖𝑔𝑛(𝑦 𝑏 [𝑛]) (1) ∆𝑏 cannot fitted to JPEG2000 compression system directly. All secret data will be destroyed because of truncating Here 𝑦 𝑏 [𝑛] denotes the sample of subbands, while 𝑞 𝑏 [𝑛] operation if it is embedded into lowest bitplanes [4]. For denotes the quantization indices and ∆ 𝑏 denotes the step JPEG2000 compression standard limited redundancy and size. bitstream truncation makes it difficult to hide information. To overcome these two problems redundancy evaluation 751 | P a g e
  • 2. Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, June-July 2012, pp.751-755 1.3 Redundancy Evaluation 1.4 Key Processing Block The redundancy of uniform quantization is In this step secret image is encrypted by using determined according to the visual masking effect and secret key. Encryption process hides the contents of the brightness sensitivity of human visual system. The information whereas stegnography hides existence of the calculation of self- contrast masking effect, neighborhood information. Suppose 𝑚 𝑖 is a secret data and 𝑛 𝑖 is a secret masking effect and local brightness weighting factor is key, then final encrypted data will be, calculated as follows. In the first step self-contrast masking effect is calculated, 𝐸𝑛𝑐𝑟𝑦𝑝𝑡𝑒𝑑 𝑑𝑎𝑡𝑎 = 𝑚 𝑖 ⊕ 𝑛 𝑖 (8) ⍺ 1.5 Message Embedding Block 𝑦 𝑖 = 𝑠𝑖𝑔𝑛( 𝑥 𝑖 ) 𝑥 𝑖 . 𝛥 𝑖 (2) In this message embedding block message is Where 𝑥 𝑖 is the quantized wavelet coefficient with bits embedded adaptively in quantized wavelet coefficient. First lower than highest no-zero bit are replaced by zeros. 𝛥 𝑖 is threshold assigned for embedding process. Wavelet quantization step. Parameter ⍺ takes value between 0 and 1. coefficients greater than given threshold are chosen as Result of first step is𝑦 𝑖 . In second step neighborhood candidate embedding point. Threshold calculated as masking is calculated follows. 𝑦𝑖 𝑧𝑖 = (3) 𝑇𝑕𝑟𝑒𝑠𝑕𝑜𝑙𝑑 = 2 𝑛 𝑤𝑕𝑒𝑟𝑒 𝑛 = 4,5,6,7 (9) 1+(𝑎 𝑘⋳ 𝑛𝑒𝑖𝑔 𝑕 𝑏𝑜𝑟 𝑕 𝑜𝑜𝑑 𝑥 𝑘 𝛽 )/ ɸ 𝑖 Next step is to calculate lowest embed allowed bitplane. The symbol 𝑥 𝑘 denotes the neighboring wavelet This can be calculated by using following formula. coefficients greater than or equal to 16 and its bits lower than highest no-zero are replaced by zeros. Symbol ɸ 𝑖 is log (𝑡𝑕𝑟𝑒𝑠 𝑕𝑜𝑙𝑑 ) number of wavelet coefficient in neighborhood. Parameter 𝐿𝑜𝑤𝑒𝑠𝑡 𝑒𝑚𝑏𝑒𝑑 𝑏𝑖𝑡𝑝𝑙𝑎𝑛𝑒 = −1 (10) log (2) β assumes value between 0 and 1. Parameter 𝑎 is a normalization factor and having constant value 𝑎 = Bitplanes lower than lowest embed allowed (10000/2 𝑑−1 ) 𝛽 . d is a bit depth of image component. In bitplanes are truncated during compression process. third step weighting factor about brightness sensitivity is Now suppose value of threshold is 16. Four wavelet calculated. coefficients A, B, C and D having values 33, 65, 9 and 128 respectively. Coefficient C cannot chosen for embedding 2 − 𝐿 𝑙, 𝑖, 𝑗 , 𝑖𝑓 𝐿 𝑙, 𝑖, 𝑗 < 1 process because its value is less than threshold. Lowest Ʌ 𝑙, 𝑖, 𝑗 = (4) 𝐿 𝑙, 𝑖, 𝑗 , 𝑂𝑡𝑕𝑒𝑟𝑤𝑖𝑠𝑒 embed allowed bitplane is 3. Now after calculation of redundancy, result for wavelet coefficients A, B and D as 1 𝑖 𝑗 follows. 𝐿 𝑙, 𝐼, 𝐽 = 1 + 𝐼𝑘 1+ ,1 + (5) 128 0 2 𝑘−1 2 𝑘−1 Ʌ 𝑙, 𝑖, 𝑗 is a local brightness weighting factor. The symbol 𝑟 𝐴 = 1.59 𝑟 𝐵 = 2.60 𝑟 𝐷 = 12.5 𝐼 𝑙 𝜃 denotes the sunband at resolution level 𝑙 ⋳ 0,1, … . . 𝑘 and with orientation 𝜃 ⋳ 𝐿𝐿, 𝐿𝐻, 𝐻𝐿, 𝐻𝐻 . The symbol 𝐼 𝑙 𝜃 (𝑖, 𝑗) denotes the wavelet coefficient located at (𝑖, 𝑗) in subband 𝐼 𝑙 𝜃 . The level of discrete wavelet decomposition is 𝑘. The result of next step is 𝑧𝑖 𝑧 ′𝑖 = (6) Ʌ(𝑙,𝑖,𝑗 ) Final quantization redundancy is calculated by using following equation. 𝑥 𝑟𝑖 = ′𝑖 (7) 𝑧𝑖 The redundancy of wavelet coefficient 𝑥 𝑖 can be measured by 𝑟𝑖 , for avoiding degradation of image we use wavelet coefficients with 𝑟𝑖 not less than 2 to carry Fig. 2 Candidate Embedding Points message bits.The rules of adjusting embedding points and intensity is as follows. Value of 𝑟 𝐴 is less than 2 . Wavelet coefficient 𝐴 cannot be used for embedding process. 1) If 𝑟𝑖 < 2, then embedding point should be removed. Value of 𝑟 𝐵 is greater than 2. 21 < 2.60 < 22 so the 2) If 2 𝑛 ≤ 𝑟𝑖 < 2 𝑛+1 then embedding capacity of this embedding capacity of coefficient 𝐵 is 1 bit. point is determined by 𝑛 bits. The final 𝑛 𝑖 is the adaptive embedding depth for each Value of 𝑟 𝐷 is greater than 2. 23 < 12.5 < 24 so the quantized wavelet coefficient 𝑥 𝑖 . embedding capacity of coefficient 𝐷 is 3 bits. In next step encrypted bits are embedded into selected wavelet coefficients adaptively. 752 | P a g e
  • 3. Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, June-July 2012, pp.751-755 III. QUALITY PARAMETERS For comparing With Redundancy Evaluation Method and Without Redundancy Evaluation Method we have considered various quality parameters such as Compression Ratio (CR), Peak Signal to Noise Ratio (PSNR) and Embedding Capacity (EC). 3.1 Compression Ratio (CR) The compression ratio is calculated as the ratio of number of bits required to represent original image to the number of bits required to represent compressed codestream. Number of bits required to represent original image Fig. 3 Adjusted embedding points and intensity 𝐶𝑅 = Number of bits required to (12) 1.6 Embedded Block Coding and Optimized Truncation represent compressed codestream (EBCOT) Encoder After message embedding process message 3.2 Peak-Signal to Noise Ratio (PSNR) embedded quantized subbands are encoded by using The PSNR is calculated by using following formula. Embedded Block coding and optimized truncation 𝑀𝐴𝑋 2 (EBCOT) encoder. EBCOT encoder is used in JPEG2000 𝑃𝑆𝑁𝑅 = 10𝑙𝑜𝑔10 𝐼 (13) 𝑀𝑆𝐸 baseline system for encoding purpose. Three coding passes 𝑚 −1 𝑛−1 are used in EBCOT encoder 1) Significance propagation 1 2 𝑀𝑆𝐸 = 𝐼 𝑖, 𝑗 − 𝐾(𝑖, 𝑗) pass 2) Magnitude refinement pass 3) Clean-up pass. These 𝑚𝑛 𝑖=0 𝑗 =0 three coding passes are used for encoding purpose. Final output of this EBCOT encoder block is one dimensional Where 𝑀𝐴𝑋 𝐼 is maximum possible pixel value of codestream. image 𝐼 𝑖, 𝑗 . 𝑀𝑆𝐸 is a mean square error. 𝐼 𝑖, 𝑗 is a original cover image. 𝐾(𝑖, 𝑗) is a reconstructed cover II. SECRET MESSAGE EXTRACTION ALGORITHM image. 𝑚 is number of rows and 𝑛 is number of columns. Extraction process is simply inverse process to that of embedding process. 3.3 Embedding Capacity (EC) Embedding capacity is calculated by using following Codestream formula. 𝑛 𝑚 Codestream Redundancy decoder Evaluation 𝐸𝐶 = 𝑛 𝑖, 𝑗 𝑖=1 𝑗 =1 Message Extraction 𝑖𝑓 x 𝑖, 𝑗 > 𝑇𝑕𝑟𝑒𝑠𝑕𝑜𝑙𝑑 (14) x 𝑖, 𝑗 is a quantized wavelet coefficient matrix. Secret Key Extracted IDWT IV. EXPERIMENTAL RESULTS AND DISCUSSIONS Data In this paper binary secret image is embedded into grayscale cover image. Image into image steganography scheme is to be carried out. Some standard grayscale Rec. Secret Rec. cover images are used as a cover images. With Redundancy Image Image Evaluation Method and Without Redundancy Evaluation Method are compared on the basis of various performance Fig. 4 Secret message extraction algorithm parameters such as Compression Ratio (CR), Peak Signal to Codestream is the input for secret message extraction Noise Ratio (PSNR) and Embedding Capacity (EC). algorithm. Output of the codestream decoder is a subbands. Lena image having size 512*512 is used for processing. After codestream decoder redundancy is to be evaluated as described in secret message embedding algorithm. By using quantization redundancy matrix 𝑟𝑖 embedded secret bits are extracted from subbands. Extracted secret bits are encrypted bits. So original secret image recovered by using following formula. 𝑚 𝑖 = 𝐸𝑛𝑐𝑟𝑦𝑝𝑡𝑒𝑑 𝑑𝑎𝑡𝑎 ⊕ 𝑛 𝑖 (11) Where 𝑚 𝑖 is a recovered secret image and 𝑛 𝑖 is encryption key. Encryption key used at embedding operation and extraction operation are same. Inverse discrete wavelet (a) (b) transform (IDWT) is used for recovering cover image Fig. 5 (a) Original Lena Image, (b) Secret Image 753 | P a g e
  • 4. Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, June-July 2012, pp.751-755 Now with compression rate 0.5, Decomposition 14000 level 5 and threshold 32 determined embedding capacity of With Red. Evaluation Lena image is 5575 bits. 5476 bits embedded in Cover 12000 image Lena with compression ratio 15.9959. At decoder Without Red. Evaluation side same parameters used for extraction of secret message. 10000 After decoding process value of PSNR is 34.2839db. Only the first, Second and third decomposition levels are used to 8000 embed secret messages. The forth and fifth decomposition level contains important low frequency components that 6000 cannot modified to hide secret messages. 4000 2000 0 0 0.2 0.4 0.6 0.8 1 . Fig. 7 Compression rate Vs Embedding Capacity Compression rate Vs embedding capacity is plotted for both With and Without Redundancy Evaluation method. (a) (b) Fig. 6 (a) Reconstructed Lena Image, (b) Retrieved 16000 Secret Image With Red. Evaluation 14000 Table 1: Results for Lena image with diff. compression Without Red. Evaluation rate and common threshold = 32 12000 Without With Redundancy 10000 C. Redundancy C. Evaluation Rate Evaluation Ratio 8000 EC NBE PSNR EC NBE PSNR 6000 0.2 1482 1444 30.973 741 676 31.217 39.974 4000 0.4 4092 3844 33.522 2045 1936 34.322 19.993 2000 0.6 7129 7056 35.065 3564 3364 36.154 13.330 0 0.8 10094 10000 36.328 5049 4900 37.446 9.998 16 32 64 128 1 13021 12996 37.263 6515 6400 38.414 7.998 . Fig. 7 Threshold Vs Embedding Capacity Threshold Vs Embedding capacity (EC) plotted for both C. Rate is a compression rate, EC is a embedding Capacity, With as well as Without Redundancy Evaluation Method. NBE is number of bits embedded, PSNR is Peak Signal to Noise Ratio and C. Ratio is a Compression Ratio. V. CONCLUSION Table 2: Results of Lena Image with diff. Thresholds Results produced with With Redundancy and common compression rate = 0.5. Evaluation method yields in large embedding capacity than Without Redundancy Evaluation method. Without changing Threshold EC of With RE EC of Without RE much image quality maximum secret data is to embedded. Redundancy evaluation method increases 16 13452 6725 Embedding capacity (EC) at the cost of slight change in Peak Signal to Noise Ratio (PSNR). 32 5574 2787 This effort gives comprehensive study of image 64 1915 957 steganography for JPEG2000 baseline system with variety of quality parameters. 128 420 210 EC of With RE means Embedding capacity With REFERENCES redundancy evaluation and EC of Without RE means [1] N. Proves and P. Honeyman, “Hide and seek: An Embedding Capacity of Without Redundancy Evaluation. introduction to Steganography,” IEEE Security and Privacy Mag., vol. 1, no. 3, pp. 32-44, 2003. 754 | P a g e
  • 5. Arjun Nichal, Dr. Shraddha Deshpande / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 4, June-July 2012, pp.751-755 [2] H. C. Wu, N. I. Wu, C. S. Tsai, and M. S. Hwang, “Image steganographic scheme based on pixel- value differencing and LSB replacement methods,” IEE Proc. Vis., Image , Signal Process., vol. 152, no.5, pp. 611–615, Oct. 2005. [3] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004. [4] JPEG2000 Part 1: Final Committee Draft Version 1.0, ISO/IEC. FCD 15444-1, 2000. [5] P. C. Su and C. C. J. Kuo, “Steganography in JPEG2000 compressed images,” IEEE Trans. Consum. Electron., vol. 49, no. 4, pp. 824–832, Apr. 2003. [6] Liang Zhang, Haili Wang and Renbiao Wu, “A high capacity stegnography scheme for JPEG2000 baseline system,” IEEE Transactions on Image Processing, vol. 18, no. 8, August 2009. 755 | P a g e