Вы находитесь на странице: 1из 10

Digital communication has become an

A PAPER PRESENTATION integral part of infrastructure now a day.


ON Lot of applications are Internet based and in
some cases it is desired that the
ROBUST METHOD OF
Communication be made secret. Two
INFORMATION HIDING USING
techniques are available to achieve this
TRANSFORM
goal: first is cryptography, where the sender
DOMAIN TECHNIQUE uses an encryption key to scramble the
WITH ADAPTIVE EMBEDDING message, this scrambled message is
transmitted through the insecure public
channel, and the reconstruction of the
original, unencrypted message is possible
ABSTRACT only if the receiver has the appropriate
There exist a wide range of protocols for decryption key. Second method is
hiding message in images. However, Steganography, where the secret message is
without leaving any apparent evidence of embedded in an image. Using this
image alteration, security and robustness technology even the fact that a secret is
will be the key attributes of any particular being transmitted has to be secret .
technique. Many attacks to security Steganography is the art and science of
constitute a first step towards performing communicating in a way, which hides the
attacks to robustness. In this paper, we existence of the communication.
demonstrate an algorithm to make the data Steganography or Stego as it is often
embedding process as robust as possible. referred to in the IT community, literally
Starting form proper selection of images, means, "covert writing" which is derived
blocks within the image and coefficients from the Greek language. In a digital world,
within the block this algorithm gives an Steganography and Cryptography are both
idea of making the embedding process intended to protect information from
robust. Experimental results show an unwanted parties. Both Steganography and
improvement as we follow this algorithm. Cryptography are excellent means by which
1. INTRODUCTION to accomplish this but neither technology
alone is perfect and both can be broken. It is
for this reason that most experts would 3. SELECTION OF IMAGE FOR DATA
suggest using both to add multiple layers of HIDING
security . The algorithm demonstrated in When we consider digital image as a cover
this paper will give an idea of selection of (image in which data is to be embedded), it
proper image for embedding the is important that the Stego-image (image
information as well as making the data along with hidden information) does not
hiding process more robust. contain any easily detectable attributes due
2. REQUIREMENTS OF STEGANO to message embedding. A third party could
GRAPHIC DATA HIDING use such attributes as an indication that a
There are three requirements depending for secret message is present. Once this
the purpose of Steganography data hiding: message detection can be reliably achieved,
a) Capacity (Pay Load): It is an important the steganographic tool becomes useless.
factor when a lot of information is to be Obviously, the less information is
embedded into a cover image. embedded into the cover-image, the smaller
For example the personal data and the the probability of introducing detectable
diagnosis could be embedded into medical attributes by the embedding process.
images. Another example could be Another important factor is the choice of
embedding personal information into finger the Cover image. The selection is at the
print image. discretion of the sender who Sends the
b) Imperceptibility: It is important when a message. The sender should avoid using
secret communication occurs between two Cover images that would be easy to analyze
parties and the fact of a secret for presence n obtained with a digital
communication is kept to be secret. For camera contain a high number of colors and
example information exchange required for are usually recommended and considered
credit card transactions. safe for Steganography. Some
c) Robustness: Watermarking, Steganography experts recommend
fingerprinting and all copyright protecting grayscale images as the best cover-images .
applications demand robust steganographic There are essentially three types of image
method, i.e. where the embedded formats: raw, uncompressed formats (BMP,
information cannot be removed without PCX), palette formats (GIF), and lossy
serious degradation of the image compressed formats (JPEG, Wavelet).
Only few current steganographic programs or Wavelet Transform (WT) domains of the
offer the capability to embed messages host signal. Transform domain cover
directly in the JPEG stream. It is a difficult modification has
problem to devise a steganographic method advantages over spatial domain cover
that would hide messages in the JPEG modification. It is robust to attacks such as
stream in a secure manner while keeping compression, cropping and some image
the capacity practical. Far more programs processing attacks and it is imperceptible to
use the BMP or GIF format. The GIF human sensory system therefore more
format is a difficult environment for secure undetectable. Data embedding is done in the
Steganography with reasonable capacity. Transform domain, with a set of transform
Also, most steganographic techniques for coefficients in the low and mid frequency
GIFs implemented in current software bands selected as possible candidates for
products prioritize capacity over security embedding (these are preserved better under
and are thus relatively easy to detect . The compression attacks than high frequency
raw formats, such as BMP, offer the highest coefficients). Most of the embedding
capacity and best overall security. methods require side information about the
4. EMBEDDING TECHNIQUES hiding locations to be sent to the decoder,
The steganographic algorithms can be which reduces the size of the payload.
divided into two groups: Spatial/Time In contrast, the method prescribed in this
domain and Transform domain techniques. paper uses property of an image block for
Least Significant Bits (LSB) modification selection of that block for embedding the
techniques are easy way to embed information. The use of local criteria for
information but they are highly vulnerable deciding where to embed is found to be
to even small cover modifications. An crucial for maintaining image quality under
attacker can apply signal processing high volume embedding. The decoder does
techniques to destroy the embedded not have explicit knowledge of the locations
information. Compression of images may where data is hidden, but employs the same
create problems and there may be total loss criteria as the encoder to guess these
of information. The transform domain locations. The distortion due to attacks may
methods operate in the Discrete Cosine now lead to insertion errors.
Transform (DCT), Fourier Transform (FT)
There may be synchronization problem 14. Embed BI in VC of all VB in zigzag
between encoder and decoder, which has to order (except DC component). Range of
be properly handled by proper coding of coefficients in middle frequency may be
text and error correcting mechanisms. chosen.
5. EMBEDDING ALGORITHM 15. Multiply all quantized coefficients by
A. Text Information processing: QM.
1. Read a text file from which information 16. Take IDCT2 of all blocks.
is to be embedded. 17. Reconstruct the image as Stego-image.
2. Encode the text information. 18. Write / Transmit image. Now let us see
3. Add redundancy for error correction into the processing of embedding in detail.
the encoded information.
4. Make a series of bits information (BI)
ready for embedding. 6. TRANSFORM DOMAIN
B. Image Processing: While transforming domain, first cover
6. Divide image into 8 x 8 blocks. image is divided into 8 x 8 blocks. These
7. Take DCT2 of each block. blocks are then converted to Discrete
8. Calculate Entropy of each block. Cosine Transform (DCT2) coefficient
9. Calculate Mean Value of Entropy (MVE) blocks using Discrete Cosine Transform.
of all blocks. Two-dimensional DCT of an M-by-N
10. Check number of blocks having Entropy matrix A is defined as follows.
greater than MVE and treat them as Valid
Blocks (VB).
11. Divide the DCT2 coefficients by
Quantization Matrix (QM)
12. Find the Valid (non zero) Coefficients
(VC) in each VB by reading them in zigzag The resultant 8 x 8 matrix of DCT2

manner. coefficients and the way in which it is

13. If the total number of VC are less than scanned from coefficient_0 to

number of BI then image is not suitable for Coefficient_63 and read while embedding

embedding the information. the information is as shown in Fig. 1. Here


coefficient_0 is called as DC coefficient.
Frequency variations in horizontal and
vertical direction are as shown in Fig. 2.
Fig. 3 shows categorization of DCT2
coefficients as low frequency (FL), middle
frequency (FM) and high frequency (FH).
In our experimentation we used middle
frequency coefficients (FM) for information Figure 3. Middle Frequency Coefficients
hiding so that the information is stored in a Level Entropy Thresholding (ET) is the
significant part of the image. In order to method used for deciding whether or not to
make the algorithm robust against JPEG embed data in each block depending on the
compression, the DCT2 coefficients chosen entropy, or energy, block can be selected
for embedding the information must be for embedding the information .
selected cleverly. It is important to note that the DC (i = j = 1)
coefficient is neither used for Entropy
calculation nor for information embedding.
This is because JPEG uses predictive
coding
for the DC coefficients and hence, any
embedding induced distortion would not be
limited a single 8 x 8 block. The blocks
Figure 1. Zigzag Scan of DCT2
whose energy is greater than a predefined
Coefficients
threshold are selected for information
embedding. Process of ET is as shown in
Fig.4, Fig.5 and Fig.6 for the images, ‘
flower’, ‘Finger’ and ‘bliss’ respectively.

Figure 2. Frequency Variation in DCT2


Figure 4. Image ‘flower.bmp’ and
Entropy Thresholding

Figure 6. Image ‘bliss.bmp’ and Entropy


Thresholding
Table 1
Image ME VB MSE PSNR
Bliss 8330 1357 3.9064 10-2 62.21
Flower 34073 1784 5.2183 10-2 60.95
finger 125216 3274 9.5725 10-2 58.32
In our experiment we tried to embed 800
characters in each of these typical images,
’flower’, ‘finger’ and ‘bliss’ respectively.
Table 1 shows our experimental result. It
gives comparison of three typical images
with respect to MVE, number of VB for
embedding, MSE and Peak Signal to Noise
Ratio (PSNR). Image ‘bliss’ is having very

Figure 5. Image ‘finger.bmp’ and low variations of pixel values, therefore

Entropy Thresholding having minimum ME as well as less


number of VB. On the other hand, image
‘finger’ is having very high variations of
pixel values and therefore maximum ME as
well as more number of VB. Table 1 clearly Finger
shows that image ‘finger’ is best suitable
candidate for hiding information for the
same value of data hiding capacity. The
graphs of block entropy of all the blocks for
all three images are as shown in Fig. 4, Fig.
5 and Fig. 6 for images, ’flower’, ‘ finger’
and ‘bliss’ respectively. Our further
experimentation is on an image ‘finger’. As
we increase the value of ET the number of
valid blocks of embedding are reducing
Figure 8. PSNR for image ‘finger’.
with increase in PSNR. The results shown
Pay load result shown in Fig. 9. gives an
in Fig. 7. and Fig. 8. gives an idea about
idea about selection of proper image for
effect of increase in threshold value of
embedding . As image ‘bliss’ gives drastic
number of valid blocks and PSNR. In order
decrease in pay load as we increase ET
to increase PSNR one should increase the
from 0.2 MVE to 2.0 MVE, hence not
value of ET. However, it reduces the valid
suitable for heavy pay load applications.
blocks and in tern pay load or embedding
capacity. Wider band of quantized middle
frequency coefficients in valid block and
keeping the close eye on PSNR is the
solution to increase the pay load.

Figure 9. Effect of ET Variation on VC

7. QUANTIZATION MATRIX
Although in this paper we explain the
technique on grayscale images, it can be
extended to color images in a
straightforward manner. We start with a
Figure 7. Number of valid blocks image
short description of the JPEG compression essential for error free extraction of the
algorithm. In JPEG compression, the image embedded information
is first divided into disjoint blocks of 8×8 9. INVERSE TRANSFORM DOMAIN
pixels. For each block (with integer pixel The DCT is an invertible transform, and its
values in the range 0-255), DCT2 is inverse IDCTis given by
calculated, producing 64 DCT coefficients.
Let us denote the i-th DCT coefficient of
the k-th block as dk (i), 0 = i = 64, k = 1, …
T, where T is the total number of blocks in
the image. In each block, all 64 coefficients
are further quantized to integers Dq(i) using
10. CONSTRUCTION OF STEGO
the JPEG quantization matrix Q as shown .
IMAGE
After the process of embedding, all the
coefficients are multiplied with the
8. EMBEDDING THE INFORMATION quantization matrix. Take the inverse DCT
For embedding the information we are of the block. The blocks, which are not used
selecting the blocks having entropy higher for embedding, are taken as it is in Stego
than the MVE for all blocks of the image. image. At the end all the blocks are
Within the block we are selecting the organized to get image, which is our stego
quantized coefficients having non-zero image.
values, and are within the middle frequency 12. LIMITATIONS
range, excluding DC component and few
Embedding in DCT domain is simply done
low frequency components. For hiding data
by altering the DCT coefficients, for
we are quantizing the values of the
example by changing the least significant
coefficients with the smallest possible
bit of each coefficient. One of the
value, so that image has less possible
constraints of embedding in DCT domain is
perceptual and statistical degradation (less
that many of the 64 coefficients are equal to
MSE). However, at the same time we have
zero, and changing two many zeros to non-
to make sure that the change persists
zeros values will have an effect on the
through the reverse process, which is
compression rate. That is why the number
of bit one could embed in DCT domain, is the information using secret key highly
less that the number of bits one could improve the security of the system, but they
embed by the LSB method. Also the do not improve in any way the robustness of
embedding capacity becomes dependent on the method. LSB insertion is an easy way
the image type used in the case of DCT and provides a high capacity to embed data
embedding, since depending on the texture into images, but it does not provide
of image the number of non-zero DCT protection against small changes resulting
coefficients will vary. Although changing from lossy compression or image
the DCT coefficients will cause transformations. An attacker may
unnoticeable visual artifices, they do cause intentionally perform a JPEG compression
detectable statistical changes. to fool the receiver because he knows that,
under a certain JPEG quality factor, the
13. ATTACKS
hidden message may effectively be
It is important to note the difference
disturbed. In this case an attacker can
between the oncepts of robustness and
disturb the message but cannot learn
security.
anything about the secret of the system. As
Attacks to robustness are those whose
we are using JPEG quantization matrix for
target is to increase the probability of error
qualifying the coefficient for embedding the
of the data-hiding channel
information the possibility of corrupting the
Attacks to security are those aimed at
information gets drastically reduced.
gaining knowledge about the secrets of the
However, as level of compression increases,
system (e.g. the embedding and/or
the number of valid coefficients gets
detection keys) Many attacks to security
reduced which in tern reduces the pay load.
constitute a first step towards performing
14. CONCLUSION
attacks to robustness. Security does not
1. Entropy thresholding gives better
imply robustness at all. A Steganography
perceptual quality of image and system
scheme can be extremely secure, in the
becomes more secured as it avoid
sense that it is (almost) impossible for an
suspicious view of the attacker.
attacker to estimate the secret key(s), but
2. Instead of fixed DCT2 coefficient the
this does not necessarily affect the
image adaptive selection of blocks and
robustness of the system. For instance,
coefficients will increase the security. Even
random selection of block for embedding
the decoder does not have explicit
knowledge of the locations where data is
hidden, but employs the same criteria
(shared with the decoder) as the encoder to
guess these locations.
3. Encryption of message before embedding
gives additional security.
4. Added redundancy in information bits
gives error free recovery of hidden data at
the receiver.
5. Quantization matrix plays an important
role in increasing the robustness and
reducing the pay load.

Вам также может понравиться