Upload
preeti-saini
View
216
Download
0
Embed Size (px)
Citation preview
7/31/2019 My Synopsis Report
1/12
1
1. INTRODUCTIONSteganography is the art of secret communication. In this , the secret information is embedded in
the cover image and transmitted In such a way that the existence of secret information is
undetectable. It not only aims to hide the secret data , but also allows communication of secret
data in an appropriate multimedia carrier, e.g., image, audio, and video files.
Here the aim of project is to hide large size digital secret image into a small-size cover image .
Cover image refers to the original image in which the secret data is to hide .It could be data,
audio, video files or image and so on. Here in the project it refers to image :both cover image and
secret image .Resultant image i.e. image hidden into cover image is known as stego image.
The stego file does not reveal any difference in attributes like size, content , etc.from that of the
original file. Hence it is difficult for the hacker to find out that the image contains a message.
Even if he doubts, he has to apply the same algorithm by which the text has been embedded into
the medium to retrieve the embedded file. Even if he finds out the algorithm ,he could get back
only the cipher text file. In the retrieved file he could see only the junk characters. To get the
original message, the same key is required which was used at the time of hiding. This adds the
extra layer of security. Therefore, steganography is a technique ,used to achieve secret
communication between two parties that are interested in hiding not only the content of a secret
message but also the act of communicating it.
Algorithms used for hiding are known as stego algorithms.
In the project two processes are used. First is the encoding process and the second is decoding
process.
Encoding is the process used to embedd the secret digital image in cover image. Decoding is
used to recover secret image from stego image.
7/31/2019 My Synopsis Report
2/12
2
2. LITERATURE SURVEY
K.B. Raja,S.Sindhu,T.D.Mahalakshmi,S.Akshatha,B.K. Nithin have
proposed a novel image adaptive steganographic technique in integer
wavelet transform domain.
Jan Kodovsky and Jessica Fridrich worked out the specific design
principles in Steganographic scheme for JPEG format and their security.
Babita Ahuja proposed for more hiding capacity achieved by Filter Based
scheme in Steganography
Mohamed Ali Bani Younes proposed stenographic approach for
hiding.This approach hides the least significant bits insertion to hide the
data within encrypted image.
Chang-Chu Chen and Chin-Chen Chang have proposed that data hiding
scheme was a modification of the LSB based Steganography using the rule
of reflected gray code.
Shaohui liu and W.Gaoproposed a Steganalysis technique on the basis of
the histogram analysis on the wavelet coefficient for detection.The
approach has given importance on the methods by which the secret
message is embedded through quantizing wavelet coefficients.
7/31/2019 My Synopsis Report
3/12
3
3. OBJECTIVE
To design a secure steganography method for embedding secret image into cover
image without producing any major change in cover image.The work deals with
the techniques for stenography in discrete wavelet transform and associated to
gray scale image. Arnold Transform is used for further improvement in security
level.
7/31/2019 My Synopsis Report
4/12
4
4. BLOCK DIAGRAM
Encoding process of stenography[2]
1. Preprocessing both the cover image(N*N) and secret image(2N*2N).
2. Perform 2-D discrete wavelet transform(DWT) at level 1 of cover image(N/2*N/2).
3. Apply private key with Arnold transformation on secret image and get the scrambled
secret image(scrambling provides security and applying key further increases the security
level).
4. Perform 2-D DWT at level 2 of the secret image image(N/2*N/2).
5. Extract the approximation co-efficient of matrix(LA) and detail coefficient matrices LH,
LV& LD of level 1 of cover image.
6. Next extract the approximation co-efficient of matrix LA1 and detail coefficient matrices
LH1, LV1 and LD1 of level 1 of the scrambled image.
7. Apply alpha blending on cover image and secret image.
8. Perform 2-D IDWT (Inverse discrete wavelet transform)to form stego image.
Alpha blending is the technique of mixing the cover image with the secret image.
7/31/2019 My Synopsis Report
5/12
5
Value of alpha determines the level of mixing.
Decoding process of stenography[2]
1. Receive the stego image.
2. Perform 2-D DWT at level 1 of the stego image amd cover image.
3. Apply alpha blending on both stego image and cover image.
4. Separate wavelet coefficients and take IDWT to reform scrambled image.
5. Perform Arnold Transformation with key and get the original secret image.
7/31/2019 My Synopsis Report
6/12
6
5. WORKING PRINCIPLE
Arnold Transform and Discrete Wavelet Transform are the two main techniques used in the
project.
Discrete Wavelet Transform:Used for image compression.Wavelets are localized waves.In DWT
the most prominent information appears in higher amplitudes and less prominent information in
lower amplitudes. Data compression can be achieved by discarding these lower
amplitudes.Wavelet transform provides high compression ratios with good quality of
reconstruction.It represents the information both in time and frequency domain and can be used
for transient functions.With DWT image could be represented in different resolutions.
2-D sub-band decomposition at level 1
Here image is partioned into sub images represented by different frequencies.Input image is first
partioned in horizontal direction in two halves.Each output is further partioned in vertical
direction in two halves by same filters.Four multiresolution sub-bands are
obtained.LL(approximate subband) is low frequency component,while LH(horizontal
subband),HL(vertical subband),HH(diagonal subband) are high frequency components.High
frequency parts represent detailed information of image texture,edge,contour,etc.Most of energy
of image is centralized in low frequency and low frequency components are resistive to
attacks.LL is a low resolution subband.Subband LL can be decomposed to obtain multi
levels.[4],[5]
7/31/2019 My Synopsis Report
7/12
7
Arnold Transformation:
Orignal image Scrambled image
Arnold Transform is realigning the pixel matrix of digital image.
Arnold Transform changes the position of two pixels ,and if it done several times
a disordered image is obtained.It is cyclic in nature,and if applied several times
original image can be obtained.2-D Arnold matrix is:
x and y are coordinates of pixel.N is the height or width of simage processed. x
and y
are the pixel of scrambled image.[5]
7/31/2019 My Synopsis Report
8/12
8
6. PLANNING OF WORK Encoding :coding upto DWT: 20th October.
Obtaining stego image till 5th November.
Decoding Process: till alpha blending 13th
November.
Reconstruct secret image:25 November.
7/31/2019 My Synopsis Report
9/12
9
7. FACILITIES USED
MATLAB 2010a and 7.10 version
7/31/2019 My Synopsis Report
10/12
10
DECLARATION
It is certified that I have checked the availability and feasibility of all the software used in the
project and I will try my best for the successful completion of project.
MANISHA
(MTE/11/06)
M.TECH 3rd
Sem.
N.C.College of Engineering, Israna,Panipat
7/31/2019 My Synopsis Report
11/12
11
CERTIFICATE
This is to Certify that Manisha, Roll No. MTE/11/06 Student of M.Tech 3rd
SEM (Electronics
and Communication Engineering) N.C College of Engineering, Israna has worked under my
guidance in the preparation of this Project entitled Modified Secure Digital Image
Stenography Based On Discrete Wavelet Transform for the award of degree of Master of
Technology in Electronics and Communication Engineering by Kurukshetra University,
Kurukshetra.
Ms. Monika Gambhir
(Asst. Professor)
ECE Department
N.C College of Engineering, Israna, Panipat
7/31/2019 My Synopsis Report
12/12
12
8.REFRENCES
[1] Alvaro Martin,Guillerno Sapiro, and Gadiel Seroussi, Is Image Stenography Natural, IEEE
Transactions on Image Processing, December 2005.
[2] Prabakaran.g, Bhavani.R, A modified Secure Digital Image Stenography Based on Discrete
Wavelet Transform, 2012 International Conference on Computing, Electronics and Electrical
Technologies[ICCEET], IEEE 2012.
[3] Adnan Mohsin Abdulazeez Brifcani and Jwan Nazeeb Al-Bamerny, Image compression
Analysis Using Multistage Vector Quantization Based on Discrete Wavelet Transform,2010
International Conference on Methods and Models in Computer Science, IEEE 2010.
[4] Rakhi Dubolia, Roop Singh, Sarita Singh Bhadoria, Rekha Gupta, Digital Image
Watermarking By Using Discrete Wavelet Transform and Discrete Cosine Transform and
Comparison Based on PSNR, 2011 International Conference on Communication Systems and
Network Technologies.
[5] Lingling Wu, Weitao Den , Jianwei Zhang , Dongyan He, Arnold Transformation
Algorithm and Anti-Arnold Transformation Algorithm , The First International Conference on
Information Science and engineering(ICISE2009), 2009.