Message Encoding in Images Using Lifting Schemes

DOI : 10.17577/IJERTV2IS80456

Download Full-Text PDF Cite this Publication

Text Only Version

Message Encoding in Images Using Lifting Schemes

A. Narasimha Reddy *, M. Kedareswara Rao #

*Final M.Tech Student, Dept of Electronics and Communication Engineering, Avanthi Institute of Engineering & Technology, Narsipatnam, Andhra Pradesh

#Assistant Professor, Dept of Electronics and Communication Engineering, Avanthi Institute of Engineering & Technology, Narsipatnam, Andhra Pradesh

Abstract The least-significant-bit (LSB)-based approach is a popular type of steganographic algorithms in the spatial domain. However, we find that in most existing approaches, the choice of embedding positions within a cover image mainly depends on a pseudorandom number generator without considering the relationship between the image content itself and the size of the secret message. Thus the smooth/flat regions in the cover images will inevitably be contaminated after data hiding even at a low embedding rate, and this will lead to poor visual quality and low security based on our analysis and extensive experiments, especially for those images with many smooth regions in this paper a novel discrete wavelet transformation is proposed to authenticated a multimedia image and at the same tie some ubiquitous secret message or image can be transmitted over the mobile network instead of direct embedding a message of image within the source image, choose a widow of size 3*3 of the source image and then convert it from spatial domain to frequency domain by using discrete wavelet transform is done as a final step of encoding by using LSB concept . And the Decoding is done by using reverse procedure

Index TermsContent-based steganography, least- significant-bit (LSB)-based steganography, pixel-value differencing (PVD), security, steganalysis.

I.INTRODUCTION

The idea of sending secret messages is not new and in the digital age many methods of hiding messages are available. Many different streams of digital media can be used as a cover stream for a secret message. Steganography is the art of writing secret messages so that only the sender and the intended recipient are aware of the hidden message.

The hidden message might be written up, down, diagonally, or rotationally around a cylinder. The concept of steganography is also referred to as hiding in plain sight. All of the steganography methods require a way to insert the message into the cover stream at the sending side, and away to extract the message on the viewing side such that the message is not recognizable unless the hiding method is known. Some programs have been developed that analyze a

media stream to determine whether any steganographic message has been added. Some of these steganalysis programs have reached high levels of accuracy in predicting which media files are cover streams and which ones are ordinary media files.

This paper introduces a method of secret message encoding that makes use of wavelets. Wavelets break down the stream into high and low frequency component parts called details and trends. As part of the research, an application called SilentWords was developed in Java that makes use of the integer-based wavelet transformation, lifting, and a Least Significant Bits (LSB) approach to hide messages in cover images.

The lifting technique allows for variation in levels of transformation, selecting region of interest on cover image to be manipulated, type of wavelet transformation to be applied, and how far apart in the image each piece of the message is to be encoded. This method of encoding can be discovered if a bitwise comparison of the cover image is done with the steganographic image, which is the image that contains the secret message. Such a comparison may reveal manipulation but not the message. One way to thwart this discovery is to prevent access to the original image.

  1. CRYPTOGRAPHY

    The earliest forms of information hiding can actually be considered to be highly crude forms of private-key cryptography; the key in this case being the knowledge of the method being employed (security through obscurity). Steganography books are filled with examples of such methods used throughout history. Greek messengers had messages tattooed into their shave head, concealing the message when their hair finally grew back. Wax tables were scraped down to bare wood were a message was scratched. Once the tablets were re-waxed, the hidden message was secure [15]. Over time these primitive cryptographic techniques improved, increasing both speed, capacity and security of the transmitted message.

    Today, crypto-graphical techniques have reached a level of sophistication such that properly encrypted communications can be assumed secure well beyond the useful life of the information transmitted. In fact, its projected that the most powerful algorithms using multi

    kilobit key lengths could not be comprised through brute force, even if all the computing power

    Worldwide for the next 20 years was focused on the attack. Of course the possibility exists that vulnerabilities could be found, or computing power breakthroughs could occur, but for most users in most applications, current cryptographic techniques are generally sufficient.

    Why then pursue the field of information hiding? Several good reasons exist, the first being that security through obscurity isnt necessarily a bad thing, provided that it isnt the only security mechanism employed. Steganography for instance allows us to hide encrypted messages in mediums

    less likely to attract attention. A garble of random characters being transmitted between two users may tip off a watchful 3rd party that sensitive information is being transmitted; whereas baby pictures with some additional noise present may not. The underlying information in the pictures is still encrypted, but

    attracts far less attention being distributed in the picture then it would otherwise.

    This becomes particularly important as the technological disparity between individuals and organizations grows. Governments and businesses typically have access to more powerful systems and better encryption algorithms then individuals. Hence, the chance of individuals messages being broken increases which each passing year. Reducing the number of messages intercepted by the organizations as suspect will certainly help to improve privacy.

    Another advantage hinted at by A. is that information hiding can fundamentally change the way that we think about information security. Cryptographic techniques generally rely on the metaphor of a piece of information being placed in a secure box and locked with a key. The information itself is not disturbed and anyone with the proper key can gain access. Once the box is open, all of the information security is lost. Compare this to information hiding techniques where the key is embedded into he information itself. Cryptography is the science of using mathematics to encrypt and decrypt data. Cryptography enables you to store sensitive information or transmit it across insecure networks (like the Internet) so that it cannot be read by anyone except the intended recipient. While cryptography is the science of securing data, cryptanalysis is the science of analyzing and breaking secure communication. Classical cryptanalysis involves an interesting combination of analytical reasoning, application of mathematical tools, pattern inding, patience, determination, and luck. Cryptanalysts are also called attackers. Cryptology embraces both cryptography and cryptanalysis.

    First we start with a few definitions. Cryptography can be defined as the processing of information into an unintelligibl (encrypted) form for the purposes of secure transmission. Through the use of a key the receiver can decode the encrypted message (decrypting) to retrieve the original message.

    Stenography improves on this by hiding the fact that a communication even occurred. The message m is imbedded into a harmless message c which is defined as the cover- object. The message m is then embedded into c, generally with use of a key k that is defined as the stego-key. The resulting message is then embedded into the cover-object c, which results in stego-object s.

  2. STEGANOGRAPHY

    Steganography means to hide secret information into innocent data. Digital images are ideal for hiding secret information. An image containing a secret message is called a cover image. First, the difference of the cover image and the stego image should be visually unnoticeable. The embedding itself should draw no extra attention to the stego image so that no hackers would try to extract the hidden message illegally. Second, the message hiding method should be reliable. It is impossible for someone to extract the hidden message if she/he does not have a special extracting method and a proper secret key. Third, the maximum length of the secret message that can be hidden should be as long as possible.

    Steganography is the art of hiding information in ways that prevent the detection of hidden messages,

    A.Steganography in History

    Steganography comes from Greek and means covered writing. The ancient Greeks wrote text on wax- covered tablets. To pass a hidden message, a person would scrape off the wax and write the message on the underlying wood. He/she would then once again cover the wood with wax so it appeared unused.

    Many developments in steganography occurred during World War II. This included the development of invisible inks, microdots, and encoded messages. One known message sent by a German spy was:

    Apparently neutrals protest is thoroughly discounted and ignored. Isman hard hit. Blockade issue affects pretext for embargo on by-products, ejecting suets and vegetables oils.

    Extracting second letter in each word reveals:

    Pershing sails from NY June 1.

    B.Steganography in the Digital Age

    Steganography is the art of secret communication. Its purpose is to hide the very presence of communication as opposed to cryptography whose goal is to make communication unintelligible to those who do not posses the right keys. Digital images, videos, sound files, and other computer files that contain perceptually irrelevant or redundant information can be used as covers or carriers to hide secret messages. After embedding a secret message into the cover-image, a so-called stego-image is obtained. It is important that the stego-image does not contain any easily

    detectable artifacts due to message embedding. A third party could use such artifacts as an indication that a secret message is present. Once this message detection can be reliably achieved, the steganographic tool becomes useless.

    Obviously, the less information is embedded into the cover-image, the smaller the probability of introducing detectable artifacts by the embedding process. Another important factor is the choice of the cover-image. The selection is at the discretion of the person who sends the message. The sender should avoid using cover-images that would be easy to analyze for presence of secret messages. For example, one should not use computer art, charts, images with large areas of uniform color, images with only a few colors, and images with a unique semantic content, such as fonts. Although computer-generated fractal images may seem as

    good covers6 because of their complexity and irregularity,

    they are generated by strict deterministic rules that may be easily violated by message embedding.

    C.Cryptography VS Steganography

    Cryptography is the science of encrypting data in such a way that no body can understand the encrypted message, whereas in steganography the existence of data is conceived means its presence cannot be noticed. The

    information to be hidden is embedded into the cover object

    lowest plane embedding secret information to avoid noise and attacks, making use of redundancy to enhance the sound embedded in the way nature to be addressed. The results showed that the proposed algorithm has a very good hidden invisibility, good security and robustness for a lot of hidden attacks.However, the limitation of capacity has led us to think about an improved approach which can be achieved through hardware implementation systems with the help of a programmable gate array (FPGA) board.

    It is the process of embedding data within the domain of another data, this data can be text, image, audio, or video contents. The embedded watermark can be visible or invisible (hidden in such a way that it cannot be retrieved without knowing the extraction algorithm) to the human eye, specified secret keys are taken into consideration in order to enhance the security of the hidden data

    When compared with the DCT, DWT is found to be more robust against various attacks. THE discrete wavelet transform (DWT) is being increasingly used for image coding. This is due to the fact that DWT supports features like progressive image transmission (by quality, by resolution), ease of compressed image manipulation, region of interest coding, etc. DWT has traditionally been implemented by convolution. Such an implementation demands both a large number of computations and a large storagefeatures that are not desirable for either high-speed or low-power applications.

    Secret

    which can be text, image, audio or video so that the appearance of cover object doesnt vary even after the information is hidden. Information to be hidden + cover object = stego object.

    To add more security the data to be hidden is encrypted with a key before embedding. To extract the hidden information one should have the key. A stego object is one, which looks exactly same as cover object with an hidden information.

    D.Steganography VS Watermarking

    Watermarking is another branch of steganography it is mainly used to restrict the piracy in digital media In

    Block Diagram

    Cover Image

    Secret image

    Image

    Encoder Stegno Image

    Key

    Decoder

    Decompresse

    Lifting DWT

    Compress ed image

    Inverse Lifting DWT

    steganography the data to be hidden is not at all related to the cover object, here our main intention is secret communication.

    Cover image

    d image

    In watermarking the data to be hidden is related to the cover object it is extended data or attribute of the cover object, here our main intention is to stop piracy of digital data. Steganography is a very powerful tool because, as the stated above, it can be very difficult to detect.

  3. PROPOSED SYSTEM

    This paper proposed LSB Information Hiding algorithm which can Lifting wavelet transform image. The idea behind the LSB algorithm is to insert the bits of the hidden message into the least significant bits of the pixels. Achieving the purpose of information hiding with the secret bits of information to replace the random noise, using the

    Fig 1: Overall Architecture Block Diagram Least significant bit (LSB) substitution

    • Easy to understand and implement

    • Used in many available stego tools

      Fig 2: LSB Architecture

      Messages are encoded in the least significant bit of every byte in an image. By doing so, the value of each pixel is changed slightly, but not enough to make significant visual changes to the image, even when compared to the original.

      Example: Inserting the word bomb using LSB techniques:

      b = 01100010

      o = 01101111

      m = 01101101

      b = 01100010

      Lifting Scheme

      Fig 3: Lifting Scheme Process Flow

      It is composed of three basic operation stages:

      • Splitting: where the signal is split into even and od

      • Predicting: Even samples are multiplied by a predict factor

      • Updation: The detailed coefficients computed by the predict step are multiplied by the update factors and then the results are added to the even samples to get the coarse coefficients.

      Need for FPGA

      Reconfigurable

      Low power Dissipation

      Small in size

      Accuracy

      Floating point

      Fig 4: FPGA Vs DSP Processors Comparison

  4. EXPERIMENTAL SETUP

    A. Xilinx Platform Studio

    The Xilinx Platform Studio (XPS) is the development environment or GUI used for designing the hardware portion of your embedded processor system. B. Embedded Development Kit Xilinx Embedded Development Kit (EDK) is an integrated software tool suite for developing embedded systems with Xilinx Micro Blaze and PowerPC CPUs. EDK includes a variety of tools and applications to assist the designer to develop an embedded system right from the

    hardware creation to final implementation of the system on an FPGA. System design consists of the creation of the hardware and software components of the embedded processor system and the creation of a verification component is optional. A typical embedded system design project involves: hardware platform creation, hardware platform verification (simulation), software platform creation, software application creation, and software verification. Base System Builder is the wizard that is used to automatically generate a hardware platform according to the user specifications that is defmed by the MHS (Microprocessor Hardware Specification) file. The MHS file defines the system architecture, peripherals and embedded processors]. The Platform Generation tool creates the hardware platform using the MHS file as input. The software platform is defmed by MSS (Microprocessor Software Specification) file which defines driver and library customization parameters for peripherals, processor customization parameters, standard 110 devices, interrupt handler routines, and other software related routines. The MSS file is an input to the Library Generator tool for customization of drivers, libraries and interrupts handlers.

    Fig 5: Embedded Development Kit Design Flow

    The creation of the verification platform is optional and is based on the hardware platform. The MHS file is taken as an input by the Simgen tool to create simulation files for a specific simulator. Three types of simulation models can be generated by the Simgen tool: behavioral, structural and timing models. Some other useful tools available in EDK are Platform Studio which provides the GUI for creating the MHS and MSS files. Create / Import IP Wizard which allows the creation of the designer's own peripheral and import them into EDK projects. Platform Generator customizes and generates the processor system in the form of hardware net lists. Library Generator tool configures libraries, device drivers, file systems and interrupt handlers for embedded processor system. Bit stream Initializer tool initializes the instruction memory of processors on the FPGA shown in figure2. GNU Compiler tools are used for compiling and linking application executables for each processor in the system [6]. There are two options available for debugging the application created using EDK namely: Xilinx Microprocessor Debug (XMD) for debugging the application software using a Microprocessor Debug Module (MDM) in the embedded processor system, and Software Debugger that invokes the software debugger corresponding to the compiler being used for the processor. C.

    Software Development Kit Xilinx Platform Studio Software Development Kit (SDK) is an integrated development environment, complimentary to XPS, that is used for C/C++ embedded software application creation and verification. SDK is built on the Eclipse open source framework. Soft Development Kit (SDK) is a suite of tools that enables you to design a software application for selected Soft IP Cores in the Xilinx Embedded Development Kit (EDK).The software application can be written in a "C or C++" then the complete embedded processor system for user application will be completed, else debug & download the bit file into FPGA. Then FPGA behaves like processor implemented on it in a Xilinx Field Programmable Gate Array (FPGA) device.

    Results and Snapshot

    Fig 6: Input Image

    Fig 7: Stego Image after LSB Encrption

    Fig 8: Original Data after LSB Decryption

    Tabulation Results

    The Algorithm is implemented in Micro blaze Processor and the results are furnished in the tabulation below

  5. CONCLUSION

In this paper we have presented a new method of adaptive steganography with higher embedding capacity. The embedding capacity of the approach is controlled through the

filter cut-off frequency. The approach was analyzed and shown to have a very high confidentiality due to the sharpness of information recovery with the cut-off frequency. The New Approach is using Lesser hardware architecture with an

reasonable speed of 83MHz Approximately in a Spartan 3 FPGA with 50MHz Clock Crystal. So We can use it to the steganography technique very easily than other techniques without any problem.

REFERENCES

[1]. B. Weaver, Now You See It, Scientific Computing 24.6 (May 2007): 18-39.

[2]. B. Glass, Hide in Plain Sight, PC Magazine 21.18 (15 Oct. 2002): 75.

[3]. Tucker, Patrick. "Hiding Secrets in Computer Files." Futurist 40.5 (Sep.2006): 12-12.

[4]. R. Gonzales, and R. Woods, Digital Image Processing, Addison Wesley Publishing Co., 1993.

[5]. C. Birslawn, Fingerprint Go Digital, Notices of American Mathematical Society, Vol. 42, No.11, P. 1278-1283, Nov. 1995.

[6]. W. Sweldens, Building Your Own Wavelets at Home, Wavelets in Computer Graphics, ACM SIGRAPH Course Notes, 1996.

[7]. A. Calderbank, I. Daubechies, W. Sweldens, and B. Yeo, Wavelet Transforms that Map Integers to Integers, Mathematics Subject Classification, 42C15, 94A29, 1996.

[8]. Xilinx, http://www.xilinx.comlproducts/design. [9]. Xilinx Inc., PicoBlaze 8-bit Embedded Microcontroller UserGuide. http://www.xilinx.comlsupport/documentation/

userJluides/ugl29.

[10].Digilent Inc., Digilent Nexys2 Board Reference Manual

[11].Xilinx. Inc., Platform Specification Format Reference Manual, Embedded Development Kit EDK 9.2i

[12].Xilinx Inc. MicroBlaze Reference Manual, version 10.1.

[13].Xilinx Inc. Xilinx ISE and Xilinx EDK tools. [14].Spartan-3 Starter Kit Board User Guide,

Xilinx, Inc.

[15].Embedded System Tools Reference Manual,

Xilinx, Inc

[16].Sparta n-3 FPGA Family: Complete Data Sheet [17].Platform Studio User Guide, Xilinx, Inc.

[18].Xilinx. Inc., Platform Specification Format Reference Manual, Embedded Development Kit EDK 9.2i

[19].Xilinx, Embedded System Example, XAPP433, version 2.2, 2006.

[20].Forchheimer R. (1999), Image coding and data compression, Linköping:Department of electrical engineering at Linköpings University.

[21].Chui C. K. (1992), An introduction to wavelets, Boston, Academic Press, ISBN 0121745848

BIOGRAPHIES:

A.Narasimha Reddy completed B.Tech Electronics and Communication Engineering in Newtons Institute of Engineering, Macherla Guntur (Dist), currently pursuing M.Tech in VLSI System Design from Avanthi Institute of Engineering & Technology, Visakhapatnam. Andhra Pradesh. Interesting research areas include VLSI semi and full custom design, Image Processing

M.Kedareswara Rao received his B.Tech degree in Electronics and Communication Engineering from JNT University, Hyderabad, India and M.Tech in Instrumentation and control systems from JNT University, Kakinada, India. He is currently working as an Assistant Professor in Avanthi Institute of Engineering and Technology, Visakhapatnam, Andhra Pradesh, India. He has 5 years teaching experience. He has 7 publications in various natinal journals. His Research areas include Image Processing, Signal Processing. He guided many projects for B.Tech and M.Tech students.

Leave a Reply