Upload
sirisha-siri
View
217
Download
0
Embed Size (px)
Citation preview
8/3/2019 A New Method for Hierarchical Image Steganography
1/5
A new method for
hierarchical image
steganography.
BY
Ph:9573397032
M.V.D [email protected] ph:9440594512
1
mailto:[email protected]:[email protected]:[email protected]:[email protected]8/3/2019 A New Method for Hierarchical Image Steganography
2/5
ABSTRACT:
A good steganographic technique embeds information in to a carrier image with
virtually imperceptible modification of the image. The present paper found a novel fact
that by inserting the hidden message bit using Least Significant Bit (LSB), the grey value
of the image pixel either remains same or increments or decrements by one. The present
paper is focused on this issue and found that such ambiguity of grey level values by LSB
method comes between successive even and odd grey level values only. In the present
paper a new method called non linear hierarchical steganography on 5X5 window pixel
values, is proposed based on the above technique. The novel method inserts hidden
message on 5X5 windows based on their grey level values and coordinate positions. The
present approach allows for high robustness, embedding capacity and enhanced security.A detailed algorithm is furnished along with the results of its application on some sample
images.
Key words: grey level value; hidden message; even and odd; non linear; robustness
INTRODUCTION:
One of the grounds for discussion in the field of information security is the hidden
exchange of information. To this end, various methods such as cryptography,
steganography, coding, etc have been used. To fight against those people like hackers,
intruders and those stealing information usually we use the cryptography method. In
cryptography, the information is encrypted with a key and only the person who has the
key can decrypt and read the information. So without the key, nobody can access the
information. But encrypted data will attract the attention. In recent years, steganography
is widely used for hidden exchange of information. The word steganography is a Greek
word that means writing in hiding. While implementing this method, the main purpose
is to hide data in a cover media so that other persons will not notice that such data is
there. This is a major distinction of this method with the other methods of hidden
exchange of data because, for example, in the method of cryptography, individuals see
the encoded data and notice that such data exists but they cannot comprehend it.
However, in steganography, individuals can notice at all that data exists in the sources[1].
2
8/3/2019 A New Method for Hierarchical Image Steganography
3/5
Most steganography jobs have been performed on images [2], video clips
[3], text [4], music and sound [5]. It has also been implemented on such varying systems
as computers and mobile phones [6]. Nowadays, however, information security has
improved considerably with the other mentioned methods. The steganography method, in
addition to application of cover exchange of information, is also used in such other
fields as copyright protection, preventing e-document forging, etc [7].
In this paper we provide a new architecture platform for hierarchical grey
level modification steganography system, which embeds binary data with in the spatial
domain of the grey scale images by modifying the grey level values of the nonlinearly
selected pixels. This paper is organized as follows: In section II methodology is given.
The results and discussions are given in section III and the final section gives
conclusions.II. METHODOLOGY:
The present method of non linear hierarchical steganography is implemented on a
5 x 5 window. The successive even and odd values are treated as same in the 5x 5
window. If two pixel grey level values have the same value then the least coordinated
value by row wise will be treated as highest value. The process is repeated for each 5X5
non overlapped window.
The above process is applied on the following images and good results are obtained
III. RESULTS and DISCUSSIONS:
The proposed method is applied on more than 32 different images of size
NXM where N and M are greater than or equal to 64. However the present paper shows
four of them of size 100X100. The results indicate robustness of the image and difficulty
in breaking the embedded code. Each character length has been made as 12 bits by
appending four bits to each of the character.
Fig 3(a) Fig 3(b)
3
8/3/2019 A New Method for Hierarchical Image Steganography
4/5
Fig 4(a) Fig 4(b)
Fig 5(a) Fig 5(b)
Fig 6(a) Fig 6(b)
Fig 3(a), 4(a), 5(a), 6(a): original images
Fig 3(b), 4(b), 5(b), 6(b): stego images with hidden text start attacking
IV. CONCLUSIONS:
The proposed steganographic method is non linear because message characters
are interested based on the value of the grey level and its co-ordinate position. The
present method identified the ambiguity of grey level values, arises between successive
even and odd values after inserting the hidden message using LSB. Future work includes
extending the method based on descending order of pixel grey level values and
appending more number of pixels for each character, which makes the method as more
dynamic. And it will become more difficult to break the text. The present method can
also be applied on any window size. Thus the present method outperforms the existing
LSB methods.
REFERENCES:
4
8/3/2019 A New Method for Hierarchical Image Steganography
5/5
[1] J.C. Judge, "Steganography: Past, Present, Future, "SANS white paper, November 30,
2001, "http://www.sans.org/rr/papers/index.php?id=552", lass visited: 10 February 2006.
[2] R. Chandramouli, N. Memon, "Analysis of LSB based image steganography
techniques," Proceedings of the International Conference on Image Processing, vol. 3, 7-
10 Oct. 2001, pp. 1019 - 1022.
[3] G. Dorr and J.L. Dugelay, "A Guide Tour of Video Watermarking," Signal
Processing: Image Communication, vol. 18, issue 4, 2003, pp. 263-282.
[4] A.M. Alattar and O.M. Alattar, "Watermarking electronic text documents containing
justified paragraphs and irregular line spacing," Proceedings of SPIE, Vol. 5306,
Security, Steganography, and Watermarking of Multimedia Contents VI, June 2004,
pp. 685-695.
[5] K. Gopalan, "Audio steganography using bit modification," Proceedings. of the IEEEInternational Conference on Acoustics, Speech, and Signal Processing, (ICASSP '03),
vol. 2, 6-10 April 2003, pp.421-424.
[6] M. Shirali Shahreza, "An Improved Method for Steganography on Mobile Phone,"
WSEASTransactions on Systems, Issue 7, Vol. 4, July 2005, pp. 955-957.
[7] F. Hartung and B. Girod, "Copyright Protection in Video Delivery Networks by
Watermarking of Pre-Compressed Video," Multimedia Applications, Services and
Techniques - ECMAST '97', Springer Lecture Notes in Computer Science, Vol. 1242,
Springer, Heidelberg, 1997, pp. 423-436.
5