Upload
fawaz-saeed
View
215
Download
0
Embed Size (px)
Citation preview
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
1/27
1
SECURE SKIN TONE
BASED STEGANOGRAHY USING WAVELET
TRANSFORM
PROJECT BY: PROJECT GUIDE:DIVYA MATHEW DR. VINU THOMASJIBIN JAMESMANOJ MMEGHA S GEORGEMOHAMMED AL-FAWAZ
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
2/27
2
INTRODUCTION
Steganography: The art of hiding the existence of data in another transmission medium to achieve secret communication.
Cover image + Secret message=Stego image
CharacteristicsImperceptibilityRobustnessStatistically undetectable
Skin-tone region : Skin tone detection is performed in HSVW avelet transform : 2D DWT
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
3/27
3
Embedding block diagram:
3
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
4/27
4
Extraction block diagram:
4
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
5/27
IMAGE LOADINGIMAGE LOADING
M*n sized image is loaded
ORIGINAL IMAGE
5
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
6/27
SKIN DETECTIONSKIN DETECTION
HSV colour space
RGB to HSV
Thres hold c hosen as [ h1, s1] & [h2, s2]
IMAGE IN HSV COLOURSPACE
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
7/27
CONTD.CONTD.
Pixel is classified as skin pixel if [h, s] is in therange
H_range = [0, 0.11] and S_range = [0.2, 0.7].
Put skin pixel as 1 & other as 0
INTERMEDIATE IMAGE
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
8/27
8
SKIN TONE DETECTIONALGORITHM
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
9/27
CROPPINGCROPPING
Done on mask image
Cropped area act as key at decoding side
Cropping is done interactively
Provides enhanced security
9
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
10/27
DWTDWT2D Haar DWT is employed.
Splits components into sub bands -LL, LH, HL,HH
Can hide data in LH, HL, HH sub bands as they are lesssensitive to human eyes
Best performance in terms of computation time.
Computation speed is high.
10
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
11/27
Step 1: At first, scan the pixels from left to right in horizontal
direction. Then, perform the addition and subtraction operationson neighboring pixels
Step 2: Perform the addition and subtraction operations onneighboring pixels and then store the sum on the top and the
difference on the bottom
11
2D HAAR DWT
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
12/27
a)Original image b)Image after applying first order 2DHaar Dwt
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
13/27
Filter bank structureThe digital filter bank is set of bandpass filters with either a commoninput or a summed outputAn M M --band analysis filter bank band analysis filter bank is shown below
13
An L--band synthesis filter bank band synthesis filter bank is shown below
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
14/27
Boundary handling Two common boundary policies are circular convolution and
padding :
Circular convolution :
14
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
15/27
Mirror padding :
Here the signal is mirrored at the boundary. Thestorage space in the wavelet domain is physicallyenlarged by each iteration step
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
16/27
Suppose C is the original 8 bit cover image of Mc x Nc pixels. It is denotedas :
C={xij, yij, z ij | 1 < i < Mc, 1 < j < Nc, xij,yij, z ij {0,1,2,,255}}
S is the n-bit secret message represented as:
S={Si | 1 < i < n, Si {0,1}}
Embedding message bit in all pixels of a group using LSBsubstitution. The mathematical representation for LSB is:
xi = xi xi mod 2k + mi
The extracted message is represented as
mi =xi mod 2k
EMBEDDING ALGORITHM
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
17/27
G rouping nine neighboring pixels of image into one :
FF FF FF
The group of pixels in an image is selected in the random order. The random order can be generated by using linear feedback shift register .
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
18/27
DECODING PROCESS
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
19/27
MERGINGMERGING
Merge the cropped stego image with originalimage to get the stego image of size MN.
To perform merging we require coefficients of first and last pixels of cropped area in originalimage.
19
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
20/27
SKIN TO N E DETECT I O NINPU T:
2 0
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
21/27
HSV output image:
21
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
22/27
22
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
23/27
M ask image:
2 3
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
24/27
2 4
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
25/27
HARDWARE IMPLEMENTATION
The hardware implementation is done using DSP Starter KitDSK TMS 320C6713.Features of TMS 320C6713 at 225 MHz :
Eight 32-Bit Instructions/Cycle32/64-Bit Data Word
225-, 200-MHz ( G DP), and 200-, 167-MHz (PYP) Clock Rates4.4-, 5-, 6-Instruction Cycle Times1800/1350, 1600/1200, and 1336/1000 MIPS /MFLOPSFour ALUs (Floating- and Fixed-Point)Two Multipliers (Floating- and Fixed-Point)Load-Store Architecture With 32 32-Bit G eneral-Purpose RegistersInstruction Packing Reduces Code Size
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
26/27
COD E COMPOS E R STUDIO
Code Composer Studio is an integrated developmentenvironment for developing applications for TexasInstruments embedded processors.
CCS includes support for OS level application debug aswell as low-level JTAG based development.Implemented one-level 2D DWTInterfaced DSK TMS320C6713.
8/2/2019 Secure Skin Tone Based Steganograhy Using Wavelet Transform
27/27
CONCLUSIONCONCLUSION
Fascinating scientific area which falls under theumbrella of security systems
No one can extract message without having thevalue of cropped region and pseudo randomcode key.
Provides fine image quality.
27