Академический Документы
Профессиональный Документы
Культура Документы
© 2013. Stuti Goel, Arun Rana & Manpreet Kaur. This is a research/review paper, distributed under the terms of the Creative Commons
Attribution-Noncommercial 3.0 Unported License http://creativecommons.org/licenses/by-nc/3.0/), permitting all non-commercial use,
distribution, and reproduction inany medium, provided the original work is properly cited.
A Review of Comparison Techniques of Image
Steganography
Stuti Goel α, Arun Rana σ & Manpreet Kaur ρ
Abstract - Steganography is an important area of research in frequency domain [6]. In spatial domain, processing is
recent years involving a number of applications. It is the
applied directly on the pixel values of the image whereas
Year 2 013
science of embedding information into the cover image viz.,
text, video, and image (payload) without causing statistically
in frequency domain, pixel values are transformed and
significant modification to the cover image. The modern then processing is applied on the transformed
secure image steganography presents a challenging task of coefficients.
transferring the embedded information to the destination
without being detected. This paper deals with hiding text in an 9
image file using Least Significant Bit (LSB) based Cover File (Image,
Steganography, Discrete Cosine Transform (DCT) based
T
he rapid growth of internet usage over high binary value of the pixels of the image in such a manner
bandwidth and low cost computer hardware has that, it doesn’t destroy the integrity of the cover image
propelled the explosive growth of steganography but this scheme is sensitive to a variety of image
[1].In the present year, secure and hidden processing attacks like compression, cropping etc. The
communication is the foremost requirement of the discrete cosine transforms (DCT) & discrete wavelet
people. Therefore steganography is gaining attraction transform (DWT) are mathematical function that
by people due to the security issues over internet. transforms digital image data from the spatial to the
Steganography means covert writing. Steganography frequency domain. In DCT, after transforming the image
has evolved into a digital strategy of hiding a file in some in frequency domain, the data is embedded in the least
form of multimedia, such as an image, an audio file or significant bits of the medium frequency components
even a video file [8]. The objective of steganography is and is specified for lossy compression while In DWT,
hiding the payload (embedded information) into the secret messages are embedded in the high frequency
cover image such that the existence of payload in the coefficients resulted from Discrete Wavelet Transform
cover image is imperceptible to the human beings [14]. and provide maximum robustness.
There are different techniques to implement
steganography namely least significant bit (LSB), II. Literature Survey
discrete cosine transform (DCT) & discrete wavelet J.R. Krenn explained steganography and its
transform(DWT) technique. implementation techniques [1]. Deshpande Neeta, et.
There are two types of domains in which al. proposed the Least Significant Bit embedding
steganography is implemented i.e. spatial domain & technique suggests that data can be hidden in the least
significant bits of the cover image and the human eye
would be unable to notice the hidden image in the cover
Author α σ ρ : E-mails : sgoel.00@gmail.com, ranaarun1@gmail.com, file. This paper explains the LSB embedding technique
er.mnprt@gmail.com and presents the evaluation results for 2, 4, 6 Least
© 2013 Global Journals Inc. (US)
A Review of Comparison Techniques of Image Steganography
significant bits for a .png file and a .bmp file [2]. K.B. Bit (LSB) based Steganography and Discrete Cosine
Raja, et. al. proposed a challenging task of transferring Transform (DCT) based Steganography [13]. K Suresh
the embedded information to the destination without Babu, et. al.proposed an image Steganography that can
being detected. In this paper, the image based verify the reliability of the information being transmitted
steganography that combines Least Significant Bit to the receiver. The method can verify whether the
(LSB), Discrete Cosine Transform (DCT), and attacker has tried to edit, delete or forge the secret
compression techniques on raw images to enhance the information in the stego-image [14]. Atalla I. Hashad, et.
security of the payload [3]. Vijay Kumar Sharma, et. al. al. describe the LSB insertion technique, the Discrete
has worked upon a new steganography algorithm for Cosine Transform (DCT) insertion technique is
8bit (gray scale) or 24bit (color image) based on Logical described and finally we will propose a new technique
operation to ensure the security against the steganalysis that uses the idea of inserting a bit in the spatial domain
Year 2 013
attack[4]. Po-Yueh Chen, et. al. proposed a new combined with the DCT insertion technique[15].
steganography technique which embeds the secret ArvindKumar, et. al. discusses how digital images can
messages in frequency domain. According to different be used as a carrier to hide Messages and also
users’ demands on the embedding capacity and image analyses the performance of some of the
10
2 quality, the proposed algorithm is divided into two steganography tools[16]. Vijay Kumar, et. al. intends to
modes and 5 cases [5]. Chen Ming, et. al. focused on observe the effect of embedding the secret message in
F ) Volume XIII Issue IV Version I
the steganography tools algorithms. Based on the different bands such as CH, CV and CD on the
analyses of the algorithms, various tools are divided into performance of stego image in terms of Peak Signal to
five categories: (1). Spatial domain based Noise Ratio (PSNR). Experimentation has been done
steganography tools; (2). Transform domain based using six different attacks. Experimental results reveal
steganography tools; (3). Document based that the error block replacement with diagonal detail
steganography tools; (4) File structure based coefficients (CD) gives better PSNR than doing so with
Steganography tools; (5) other categories, e.g. video other coefficients [17]. Ali Al-Ataby, et. al. proposed a
compress encoding and spread spectrum technique modified high-capacity image steganography technique
based [6]. Aneesh Jain, et. al. proposed a scheme that depends on wavelet transform with acceptable
which hides data in bitmap images, in a way that there is levels of imperceptibility and distortion in the cover
almost no perceptible difference between the original image and high level of overall security[18]. T.
image and this new image and which is also resistant to Narasimmalou, et. al. Proposed an optimal discrete
Global Journal of Computer Science and Technology ( D
JPEG compression[7]. Beenish Mehboob,et. al. wavelet transform (DWT) based steganography.
discusses the art and science of Steganography in Experiments show that the peak signal noise ratio
general and proposes a novel technique to hide data in (PSNR) generated by the proposed method is
a colorful image using least significant bit[8]. Hassan better[19]. NedaRaftari, et. al. proposed a novel image
Mathkour, et. al. seta a criteria to analyze and evaluate steganography technique that combines the Integer
the strengths and weaknesses of the presented Wavelet Transform (IWT) and Discrete Cosine Transform
techniques and a more robust steganography technique (DCT) is proposed which embeds secret image in
has been developed that takes advantages of the frequency domain of cover image with high matching
strengths and avoids the limitations[9]. Nageswara Rao quality[20].
Thota, et. al. attempted to implement basic JPEG
compression using only basic MATLAB functions[10]. III. Methods of Concealing Datain
Mamta Juneja, et. al. discusses the design of a Robust Digital Image
image steganography technique based on LSB (Least
Significant Bit) insertion and RSA encryption Steganography is used for covert
technique[11]. K.B. Shiva Kumar, et. al. discusses the communication. The secret image which is
important issue of modern communication is communicated to the destination is embedded into the
establishing secret communication while using public cover image to derive the stego image. In this section
channel and is achieved by steganography. In this evaluation parameters and proposed embedding and
paper, Coherent Steganography Technique using retrieval techniques are discussed.
Segmentation and Discrete Cosine Transform a) Least significant bit substitution technique(LSB)
(CSSDCT) is proposed. The cover image is divided into In LSB steganography, the least significant bits
8*8 blocks and DCT is applied on each block. The of the cover media’s digital data are used to conceal the
number of payload MSB bits is embedded into DCT message. The simplest of the LSB steganography
coefficients of the cover image coherently based on the techniques is LSB replacement. LSB replacement
values of DCT coefficients. It is observed that the steganography flips the last bit of each of the data
proposed algorithm has better PSNR, Security and values to reflect the message that needs to be hidden.
capacity compared to the existing techniques [12]. Dr. Consider an 8-bitgrayscale bitmap image where each
Ekta Walia, et. al presents analysis of Least Significant pixel is stored as a byte representing a gray scale value.
© 2013 Global Journals Inc. (US)
A Review of Comparison Techniques of Image Steganography
Suppose the first eight pixels of the original image have In low frequency sub-band, much of the signal
the following gray scale values [4]: energy lies at low frequency which contains most
important visual parts of the image while in high
11010010
frequency sub-band, high frequency components of the
01001010
image are usually removed through compression and
10010111
noise attacks [13]. So the secret message is embedded
10001100
by modifying the coefficients of the middle frequency
00010101
sub-band, so that the visibility of the image will not be
01010111
affected. The general equation for a 1D (N data items)
00100110
DCT is defined by the following equation: [12] be
01000011
affected.
Year 2 013
To hide the letter C whose binary value is
10000011, we would replace the LSBs of these pixels to
have the following new grayscale values:
11010011 11
01001010
10010110
table.
L H Step 7: Calculate LSB of each DC coefficient and
replace with each bit of secret message.
Step 8: Write stego image.
12
2 Step 9: Calculate the Mean square Error (MSE), Peak
Figure 3 : The horizontal operation on first row[5] signal to noise ratio (PSNR) of the stego image.
F ) Volume XIII Issue IV Version I
Step 2: Secondly, scan the pixels from top to Algorithm to retrieve text message:-
bottom in vertical direction. Perform the addition and Step 1: Read stego image.
subtraction operations on neighboring pixels and then Step 2: Stego image is broken into 8×8 block of pixels.
store the sum on the top and the difference on the Step 3: Working from left to right, top to bottom subtract
bottom as illustrated in Figure 4. Repeat this operation 128 in each block of pixels.
until all the columns are processed. Finally we will obtain Step 4: DCT is applied to each block.
4 sub-bands denoted as LL, HL, LH, and HH Step 5: Each block is compressed through quantization
respectively. The LL sub-band is the low frequency table.
portion and hence looks very similar to the original Step 6: Calculate LSB of each DC coefficient.
image. The whole procedure described is called the Step 7: Retrieve and convert each 8 bit into character.
first-order 2-D Haar-DWT.
c) DWT Based Steganography
Global Journal of Computer Science and Technology ( D
M 2909204
O 29092
M+N O+P Algorithm to retrieve text message:-
04 Step 1: Read the cover image and text message which
N P LL is to be hidden in the cover image.
HL
Step 2: Convert the text message into binary. Apply 2D-
M-N O-P
Haar transform on the cover image.
L H Step 3: Obtain the horizontal and vertical filtering
LH coefficients of the cover image. Cover image is added
HH
with data bits for DWT coefficients.
Figure 4 : The vertical operation[5] Step 4: Obtain stego image.
Step 5: Calculate the Mean square Error (MSE), Peak
IV. Algorithm of Steganography
signal to noise ratio (PSNR) of the stego image.
a) LSB Based Steganography[12] Algorithm to retrieve text message:-
Algorithm to embed text message:- Step 1: Read the stego image.
Step 1: Read the cover image and text message which Step 2: Obtain the horizontal and vertical filtering
is to be hidden in the cover image. coefficients of the cover image. Extract the message bit
Step 2: Convert text message in binary. by bit and recomposing the cover image.
Step 3: Calculate LSB of each pixels of cover image. Step 3: Convert the data into message vector. Compare
Step 4: Replace LSB of cover image with each bit of it with original message.
secret message one by one.
Step 5: Write stego image.
V. Evaluation of Image Quality
Step 6: Calculate the Mean square Error (MSE), Peak For comparing stego image with cover results
signal to noise ratio (PSNR) of the stego image. requires a measure of image quality, commonly used
measures are Mean-Squared Error, Peak Signal-to-
Algorithm to retrieve text message:-
Noise Ratio and capacity.
Step 1: Read the stego image.
Step 2: Calculate LSB of each pixels of stego image.
Step 3: Retrieve bits and convert each 8 bit into
character.
© 2013 Global Journals Inc. (US)
A Review of Comparison Techniques of Image Steganography
Year 2 013
problem by scaling the MSE according to the image
Jet 55.6473 .420896
range [5]:
Baboon 58.3766 .30740
2562
𝑃𝑃𝑃𝑃𝑃𝑃𝑃𝑃 = 10 log10 Table 6.3 : DWT transform technique[23]
𝑀𝑀𝑀𝑀𝑀𝑀
13
PSNR is measured in decibels (dB). PSNR is a
good measure for comparing restoration results for the
robust method in which the image is not destroyed on using Segmentation and DCT”, IEEE-978-1-4244-
extracting the message hidden in it and provides 5967-4/10/$26.00 ©2010.
maximum security. 13. K Suresh Babu, K B Raja, Kiran Kumar K, Manjula
Devi T H, Venugopal K R, L M Patnaik,
References Références Referencias “Authentication of Secret Information in Image
Steganography” .
1. J.R. Krenn, “Steganography and Steganalysis”,
14. Arvind Kumar, Km. Pooja, “Steganography- A Data
January 2004. Deshpande Neeta, Kamalapur
Hiding Technique”, International Journal of
Snehal, Daisy Jacobs, “Implementation of LSB
Computer Applications (0975 – 8887), Volume 9,
Steganography and its Evaluation for Various
No.7, November 2010.
Bits”, 2004.
Year 2 013