Вы находитесь на странице: 1из 7

i

ABSTRACT
Steganography is the most used technique for data hiding. It can be
implemented using any cover media like text, images and videos. Proposed
research paper presents an efficient insertion technique for image steganography
based on DWT, where DWT is used to transform original image (cover image)
from spatial domain to frequency domain. Two dimensional Discrete Wavelet
Transform (2D-DWT) is performed on cover image of size M N. The secret
message is encrypted using Blowfish encryption algorithm. The proposed
insertion technique will apply only in LL section of DWT and all pixel block
will be divided into 2*2 blocks type as well. It improves the image quality and
imperceptibility. Proposed system presents new insertion technique which
embeds the secret messages in frequency domain. It can measure the quality of
container image with secret image after image hiding process PSNR values.
Extensive testing is performed using different sizes of images and presented
experimental results in payload and PSNR values.

Keywords Blowfish Encryption, DWT Discrete Wavelet Transform, 2D-
DWT Two Dimensional Discrete Wavelet Transform, PSNR Peak Signal to
Noise Ratio, Steganography



ii
TABLE OF CONTENTS
Page
ABSTRACT i
TABLE OF CONTENTS ii
LIST OF ABBREVIATIONS iii
LIST OF FIGURES v
LIST OF TABLES vi
CHAPTER TITLE
1 INTRODUCTION TO STEGANOGRAPHY 1
1.1 Introduction 1
1.2 Encryption-decryption Algorithm 3
1.3 Motivation and Background 4
1.4 Contribution of Research Work 4
1.5 Objectives of Research Work 5
1.6 Organization of Research Work 5
2 LITERATURE REVIEW AND BACKGROUND THEORY 6
2.1 Related Works 6
2.2 Wavelet Transform 8
2.2.1 Harr wavelets 8
2.2.2 Daubechies wavelets 8
2.2.3 The Dual-Tree Complex Wavelet Transform 9
2.3 Blowfish Encryption Algorithm 12
2.3.1. Blowfish Algorithm Architecture 12
2.3.2 Description of the Algorithm 13
2.3.3 Subkeys 14
2.3.4 Encryption 15
2.3.5 Generating the Subkeys 15
2.4 Summary 16


iii
3 PROPOSED SYSTEM ARCHITECTURE AND
IMPLEMENTATION 18
3.1 Proposed Steganography Method 18
3.2 Proposed Insertion Technique 18
3.2.1 New Insertion Method Flow 20
3.2.2 Extraction Process 21
3.3 Proposed System Process Flow 21
3.4 Proposed System Implementation Process 25
3.4.1 Stego Insertion Section (Encoding Process) 25
3.4.2 Stego Extraction Section (Decoding Process) 29

4 CONCLUSION AND FUTURE WORK 26
4.1 Conclusion 26
4.2 Future Work 26
4.3 Steps of Implementation 27
REFERENCES 28



iv
LIST OF ABBREVIATIONS
1D-DWT - One Dimentional Discrete Wavelet Transform
2D-DWT - Two Dimentional Discrete Wavelet Transform
3DES - Triple DES
AES - Advanced Encryption Standard
CWT - Dual-Tree Complex Wavelet Transform
DCT - Discrete Cosine Transform
DES - Data Encryption Standard
DWT - Discrete Wavelet Transform
FB - Filter Bank
FFT - Fast Fourier Transform
HDLS - Hybrid Steganography
HH - High Range Frequency Band
HVS - Human Visual System
IWT - Integer Wavelet Transform
LH, HL - Middle Range Frequency Band
LL - Low Range Frequency Band
LSB - Least Significant Bits
PSNR - Peak Signal to Noise Ratio
RGB - Red, Green and Blue
UWB - Ultra-Wide Bank


v
VQ - Vector Quantization
XOR - Exclusive OR



vi
LIST OF FIGURES
Figure Page
1.1 The block diagram of simple steganographic system 2
1.2 Encryption-Decryption Flow 3
2.1 Two level 1D- Discrete Wavelet Transform 9
2.2 Standard 2D-DWT with two transformation levels 10
2.3 Sub-band decomposition using a 2D-DWT
with three transformation levels 10
2.4 2D-DWT for image 11
3.1 General representation for proposed steganography
Method 18
3.2 General processes flow chart of proposed system 22
3.3 Implementation of system flow chart 23
3.4 Encoding and Decoding process of Proposed System
3.5 Original Message Filling Process
3.6 Inputting Blowfish Key
3.7 Output Cipher with Hexadecimal Format
3.8 Encoding Process with New Insertion Technique
3.9 Selecting Cover Image from Local Drive
3.10 Changing Cover Image into DWT domain
3.11 Hiding Encoded Message into DWT domain
3.12 Inverse Process of DWT
3.13 Saving Stego Image into Local Drive
3.14 Extraction Process of Proposed System
3.15 Inputting Cover Image together with Stego Image
3.16 Extracting Encoded Message Process
3.17 Decoding Process Flow
3.18 Inputting Blowfish Key and Decryption Process Flow


vii
LIST OF TABLES
Table Page
4.1 Steps of Implementation 27

Вам также может понравиться