My Synopsis Report

Embed Size (px)

Citation preview

  • 7/31/2019 My Synopsis Report

    1/12

    1

    1. INTRODUCTIONSteganography is the art of secret communication. In this , the secret information is embedded in

    the cover image and transmitted In such a way that the existence of secret information is

    undetectable. It not only aims to hide the secret data , but also allows communication of secret

    data in an appropriate multimedia carrier, e.g., image, audio, and video files.

    Here the aim of project is to hide large size digital secret image into a small-size cover image .

    Cover image refers to the original image in which the secret data is to hide .It could be data,

    audio, video files or image and so on. Here in the project it refers to image :both cover image and

    secret image .Resultant image i.e. image hidden into cover image is known as stego image.

    The stego file does not reveal any difference in attributes like size, content , etc.from that of the

    original file. Hence it is difficult for the hacker to find out that the image contains a message.

    Even if he doubts, he has to apply the same algorithm by which the text has been embedded into

    the medium to retrieve the embedded file. Even if he finds out the algorithm ,he could get back

    only the cipher text file. In the retrieved file he could see only the junk characters. To get the

    original message, the same key is required which was used at the time of hiding. This adds the

    extra layer of security. Therefore, steganography is a technique ,used to achieve secret

    communication between two parties that are interested in hiding not only the content of a secret

    message but also the act of communicating it.

    Algorithms used for hiding are known as stego algorithms.

    In the project two processes are used. First is the encoding process and the second is decoding

    process.

    Encoding is the process used to embedd the secret digital image in cover image. Decoding is

    used to recover secret image from stego image.

  • 7/31/2019 My Synopsis Report

    2/12

    2

    2. LITERATURE SURVEY

    K.B. Raja,S.Sindhu,T.D.Mahalakshmi,S.Akshatha,B.K. Nithin have

    proposed a novel image adaptive steganographic technique in integer

    wavelet transform domain.

    Jan Kodovsky and Jessica Fridrich worked out the specific design

    principles in Steganographic scheme for JPEG format and their security.

    Babita Ahuja proposed for more hiding capacity achieved by Filter Based

    scheme in Steganography

    Mohamed Ali Bani Younes proposed stenographic approach for

    hiding.This approach hides the least significant bits insertion to hide the

    data within encrypted image.

    Chang-Chu Chen and Chin-Chen Chang have proposed that data hiding

    scheme was a modification of the LSB based Steganography using the rule

    of reflected gray code.

    Shaohui liu and W.Gaoproposed a Steganalysis technique on the basis of

    the histogram analysis on the wavelet coefficient for detection.The

    approach has given importance on the methods by which the secret

    message is embedded through quantizing wavelet coefficients.

  • 7/31/2019 My Synopsis Report

    3/12

    3

    3. OBJECTIVE

    To design a secure steganography method for embedding secret image into cover

    image without producing any major change in cover image.The work deals with

    the techniques for stenography in discrete wavelet transform and associated to

    gray scale image. Arnold Transform is used for further improvement in security

    level.

  • 7/31/2019 My Synopsis Report

    4/12

    4

    4. BLOCK DIAGRAM

    Encoding process of stenography[2]

    1. Preprocessing both the cover image(N*N) and secret image(2N*2N).

    2. Perform 2-D discrete wavelet transform(DWT) at level 1 of cover image(N/2*N/2).

    3. Apply private key with Arnold transformation on secret image and get the scrambled

    secret image(scrambling provides security and applying key further increases the security

    level).

    4. Perform 2-D DWT at level 2 of the secret image image(N/2*N/2).

    5. Extract the approximation co-efficient of matrix(LA) and detail coefficient matrices LH,

    LV& LD of level 1 of cover image.

    6. Next extract the approximation co-efficient of matrix LA1 and detail coefficient matrices

    LH1, LV1 and LD1 of level 1 of the scrambled image.

    7. Apply alpha blending on cover image and secret image.

    8. Perform 2-D IDWT (Inverse discrete wavelet transform)to form stego image.

    Alpha blending is the technique of mixing the cover image with the secret image.

  • 7/31/2019 My Synopsis Report

    5/12

    5

    Value of alpha determines the level of mixing.

    Decoding process of stenography[2]

    1. Receive the stego image.

    2. Perform 2-D DWT at level 1 of the stego image amd cover image.

    3. Apply alpha blending on both stego image and cover image.

    4. Separate wavelet coefficients and take IDWT to reform scrambled image.

    5. Perform Arnold Transformation with key and get the original secret image.

  • 7/31/2019 My Synopsis Report

    6/12

    6

    5. WORKING PRINCIPLE

    Arnold Transform and Discrete Wavelet Transform are the two main techniques used in the

    project.

    Discrete Wavelet Transform:Used for image compression.Wavelets are localized waves.In DWT

    the most prominent information appears in higher amplitudes and less prominent information in

    lower amplitudes. Data compression can be achieved by discarding these lower

    amplitudes.Wavelet transform provides high compression ratios with good quality of

    reconstruction.It represents the information both in time and frequency domain and can be used

    for transient functions.With DWT image could be represented in different resolutions.

    2-D sub-band decomposition at level 1

    Here image is partioned into sub images represented by different frequencies.Input image is first

    partioned in horizontal direction in two halves.Each output is further partioned in vertical

    direction in two halves by same filters.Four multiresolution sub-bands are

    obtained.LL(approximate subband) is low frequency component,while LH(horizontal

    subband),HL(vertical subband),HH(diagonal subband) are high frequency components.High

    frequency parts represent detailed information of image texture,edge,contour,etc.Most of energy

    of image is centralized in low frequency and low frequency components are resistive to

    attacks.LL is a low resolution subband.Subband LL can be decomposed to obtain multi

    levels.[4],[5]

  • 7/31/2019 My Synopsis Report

    7/12

    7

    Arnold Transformation:

    Orignal image Scrambled image

    Arnold Transform is realigning the pixel matrix of digital image.

    Arnold Transform changes the position of two pixels ,and if it done several times

    a disordered image is obtained.It is cyclic in nature,and if applied several times

    original image can be obtained.2-D Arnold matrix is:

    x and y are coordinates of pixel.N is the height or width of simage processed. x

    and y

    are the pixel of scrambled image.[5]

  • 7/31/2019 My Synopsis Report

    8/12

    8

    6. PLANNING OF WORK Encoding :coding upto DWT: 20th October.

    Obtaining stego image till 5th November.

    Decoding Process: till alpha blending 13th

    November.

    Reconstruct secret image:25 November.

  • 7/31/2019 My Synopsis Report

    9/12

    9

    7. FACILITIES USED

    MATLAB 2010a and 7.10 version

  • 7/31/2019 My Synopsis Report

    10/12

    10

    DECLARATION

    It is certified that I have checked the availability and feasibility of all the software used in the

    project and I will try my best for the successful completion of project.

    MANISHA

    (MTE/11/06)

    M.TECH 3rd

    Sem.

    N.C.College of Engineering, Israna,Panipat

  • 7/31/2019 My Synopsis Report

    11/12

    11

    CERTIFICATE

    This is to Certify that Manisha, Roll No. MTE/11/06 Student of M.Tech 3rd

    SEM (Electronics

    and Communication Engineering) N.C College of Engineering, Israna has worked under my

    guidance in the preparation of this Project entitled Modified Secure Digital Image

    Stenography Based On Discrete Wavelet Transform for the award of degree of Master of

    Technology in Electronics and Communication Engineering by Kurukshetra University,

    Kurukshetra.

    Ms. Monika Gambhir

    (Asst. Professor)

    ECE Department

    N.C College of Engineering, Israna, Panipat

  • 7/31/2019 My Synopsis Report

    12/12

    12

    8.REFRENCES

    [1] Alvaro Martin,Guillerno Sapiro, and Gadiel Seroussi, Is Image Stenography Natural, IEEE

    Transactions on Image Processing, December 2005.

    [2] Prabakaran.g, Bhavani.R, A modified Secure Digital Image Stenography Based on Discrete

    Wavelet Transform, 2012 International Conference on Computing, Electronics and Electrical

    Technologies[ICCEET], IEEE 2012.

    [3] Adnan Mohsin Abdulazeez Brifcani and Jwan Nazeeb Al-Bamerny, Image compression

    Analysis Using Multistage Vector Quantization Based on Discrete Wavelet Transform,2010

    International Conference on Methods and Models in Computer Science, IEEE 2010.

    [4] Rakhi Dubolia, Roop Singh, Sarita Singh Bhadoria, Rekha Gupta, Digital Image

    Watermarking By Using Discrete Wavelet Transform and Discrete Cosine Transform and

    Comparison Based on PSNR, 2011 International Conference on Communication Systems and

    Network Technologies.

    [5] Lingling Wu, Weitao Den , Jianwei Zhang , Dongyan He, Arnold Transformation

    Algorithm and Anti-Arnold Transformation Algorithm , The First International Conference on

    Information Science and engineering(ICISE2009), 2009.