Академический Документы
Профессиональный Документы
Культура Документы
13. If the total number of VC are less than scanned from coefficient_0 to
number of BI then image is not suitable for Coefficient_63 and read while embedding
7. QUANTIZATION MATRIX
Although in this paper we explain the
technique on grayscale images, it can be
extended to color images in a
straightforward manner. We start with a
Figure 7. Number of valid blocks image
short description of the JPEG compression essential for error free extraction of the
algorithm. In JPEG compression, the image embedded information
is first divided into disjoint blocks of 8×8 9. INVERSE TRANSFORM DOMAIN
pixels. For each block (with integer pixel The DCT is an invertible transform, and its
values in the range 0-255), DCT2 is inverse IDCTis given by
calculated, producing 64 DCT coefficients.
Let us denote the i-th DCT coefficient of
the k-th block as dk (i), 0 = i = 64, k = 1, …
T, where T is the total number of blocks in
the image. In each block, all 64 coefficients
are further quantized to integers Dq(i) using
10. CONSTRUCTION OF STEGO
the JPEG quantization matrix Q as shown .
IMAGE
After the process of embedding, all the
coefficients are multiplied with the
8. EMBEDDING THE INFORMATION quantization matrix. Take the inverse DCT
For embedding the information we are of the block. The blocks, which are not used
selecting the blocks having entropy higher for embedding, are taken as it is in Stego
than the MVE for all blocks of the image. image. At the end all the blocks are
Within the block we are selecting the organized to get image, which is our stego
quantized coefficients having non-zero image.
values, and are within the middle frequency 12. LIMITATIONS
range, excluding DC component and few
Embedding in DCT domain is simply done
low frequency components. For hiding data
by altering the DCT coefficients, for
we are quantizing the values of the
example by changing the least significant
coefficients with the smallest possible
bit of each coefficient. One of the
value, so that image has less possible
constraints of embedding in DCT domain is
perceptual and statistical degradation (less
that many of the 64 coefficients are equal to
MSE). However, at the same time we have
zero, and changing two many zeros to non-
to make sure that the change persists
zeros values will have an effect on the
through the reverse process, which is
compression rate. That is why the number
of bit one could embed in DCT domain, is the information using secret key highly
less that the number of bits one could improve the security of the system, but they
embed by the LSB method. Also the do not improve in any way the robustness of
embedding capacity becomes dependent on the method. LSB insertion is an easy way
the image type used in the case of DCT and provides a high capacity to embed data
embedding, since depending on the texture into images, but it does not provide
of image the number of non-zero DCT protection against small changes resulting
coefficients will vary. Although changing from lossy compression or image
the DCT coefficients will cause transformations. An attacker may
unnoticeable visual artifices, they do cause intentionally perform a JPEG compression
detectable statistical changes. to fool the receiver because he knows that,
under a certain JPEG quality factor, the
13. ATTACKS
hidden message may effectively be
It is important to note the difference
disturbed. In this case an attacker can
between the oncepts of robustness and
disturb the message but cannot learn
security.
anything about the secret of the system. As
Attacks to robustness are those whose
we are using JPEG quantization matrix for
target is to increase the probability of error
qualifying the coefficient for embedding the
of the data-hiding channel
information the possibility of corrupting the
Attacks to security are those aimed at
information gets drastically reduced.
gaining knowledge about the secrets of the
However, as level of compression increases,
system (e.g. the embedding and/or
the number of valid coefficients gets
detection keys) Many attacks to security
reduced which in tern reduces the pay load.
constitute a first step towards performing
14. CONCLUSION
attacks to robustness. Security does not
1. Entropy thresholding gives better
imply robustness at all. A Steganography
perceptual quality of image and system
scheme can be extremely secure, in the
becomes more secured as it avoid
sense that it is (almost) impossible for an
suspicious view of the attacker.
attacker to estimate the secret key(s), but
2. Instead of fixed DCT2 coefficient the
this does not necessarily affect the
image adaptive selection of blocks and
robustness of the system. For instance,
coefficients will increase the security. Even
random selection of block for embedding
the decoder does not have explicit
knowledge of the locations where data is
hidden, but employs the same criteria
(shared with the decoder) as the encoder to
guess these locations.
3. Encryption of message before embedding
gives additional security.
4. Added redundancy in information bits
gives error free recovery of hidden data at
the receiver.
5. Quantization matrix plays an important
role in increasing the robustness and
reducing the pay load.