You are on page 1of 12

1. INTRODUCTION Steganography is the art of secret communication.

In this , the secret information is embedded in the cover image and transmitted In such a way that the existence of secret information is undetectable. It not only aims to hide the secret data , but also allows communication of secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. Here the aim of project is to hide large size digital secret image into a small-size cover image . Cover image refers to the original image in which the secret data is to hide .It could be data, audio, video files or image and so on. Here in the project it refers to image :both cover image and secret image .Resultant image i.e. image hidden into cover image is known as stego image. The stego file does not reveal any difference in attributes like size, content , etc.from that of the original file. Hence it is difficult for the hacker to find out that the image contains a message. Even if he doubts, he has to apply the same algorithm by which the text has been embedded into the medium to retrieve the embedded file. Even if he finds out the algorithm ,he could get back only the cipher text file. In the retrieved file he could see only the junk characters. To get the original message, the same key is required which was used at the time of hiding. This adds the extra layer of security. Therefore, steganography is a technique ,used to achieve secret communication between two parties that are interested in hiding not only the content of a secret message but also the act of communicating it. Algorithms used for hiding are known as stego algorithms. In the project two processes are used. First is the encoding process and the second is decoding process. Encoding is the process used to embedd the secret digital image in cover image. Decoding is used to recover secret image from stego image.

2. LITERATURE SURVEY

K.B.

Raja,S.Sindhu,T.D.Mahalakshmi,S.Akshatha,B.K.

Nithin

have

proposed a novel image adaptive steganographic technique in integer wavelet transform domain. Jan Kodovsky and Jessica Fridrich worked out the specific design principles in Steganographic scheme for JPEG format and their security. Babita Ahuja proposed for more hiding capacity achieved by Filter Based scheme in Steganography

Mohamed Ali Bani Younes proposed stenographic approach for hiding.This approach hides the least significant bits insertion to hide the data within encrypted image.

Chang-Chu Chen and Chin-Chen Chang have proposed that data hiding scheme was a modification of the LSB based Steganography using the rule of reflected gray code.

Shaohui liu and W.Gaoproposed a Steganalysis technique on the basis of the histogram analysis on the wavelet coefficient for detection.The approach has given importance on the methods by which the secret message is embedded through quantizing wavelet coefficients.

3. OBJECTIVE

To design a secure steganography method for embedding secret image into cover image without producing any major change in cover image.The work deals with the techniques for stenography in discrete wavelet transform and associated to gray scale image. Arnold Transform is used for further improvement in security level.

4. BLOCK DIAGRAM

Encoding process of stenography[2]

1. Preprocessing both the cover image(N*N) and secret image(2N*2N). 2. Perform 2-D discrete wavelet transform(DWT) at level 1 of cover image(N/2*N/2). 3. Apply private key with Arnold transformation on secret image and get the scrambled secret image(scrambling provides security and applying key further increases the security level). 4. Perform 2-D DWT at level 2 of the secret image image(N/2*N/2). 5. Extract the approximation co-efficient of matrix(LA) and detail coefficient matrices LH, LV& LD of level 1 of cover image. 6. Next extract the approximation co-efficient of matrix LA1 and detail coefficient matrices LH1, LV1 and LD1 of level 1 of the scrambled image. 7. Apply alpha blending on cover image and secret image. 8. Perform 2-D IDWT (Inverse discrete wavelet transform)to form stego image. Alpha blending is the technique of mixing the cover image with the secret image.

Value of alpha determines the level of mixing.

Decoding process of stenography[2] 1. Receive the stego image. 2. Perform 2-D DWT at level 1 of the stego image amd cover image. 3. Apply alpha blending on both stego image and cover image. 4. Separate wavelet coefficients and take IDWT to reform scrambled image. 5. Perform Arnold Transformation with key and get the original secret image.

5. WORKING PRINCIPLE Arnold Transform and Discrete Wavelet Transform are the two main techniques used in the project. Discrete Wavelet Transform:Used for image compression.Wavelets are localized waves.In DWT the most prominent information appears in higher amplitudes and less prominent information in lower amplitudes. Data compression can be achieved by discarding these lower amplitudes.Wavelet transform provides high compression ratios with good quality of reconstruction.It represents the information both in time and frequency domain and can be used for transient functions.With DWT image could be represented in different resolutions.

2-D sub-band decomposition at level 1 Here image is partioned into sub images represented by different frequencies.Input image is first partioned in horizontal direction in two halves.Each output is further partioned in vertical direction in two halves by same is low filters.Four frequency multiresolution component,while sub-bands are

obtained.LL(approximate

subband)

LH(horizontal

subband),HL(vertical subband),HH(diagonal subband) are high frequency components.High frequency parts represent detailed information of image texture,edge,contour,etc.Most of energy of image is centralized in low frequency and low frequency components are resistive to attacks.LL is a low resolution subband.Subband LL can be decomposed to obtain multi levels.[4],[5]

Arnold Transformation:

Orignal image

Scrambled image

Arnold Transform is realigning the pixel matrix of digital image. Arnold Transform changes the position of two pixels ,and if it done several times a disordered image is obtained.It is cyclic in nature,and if applied several times original image can be obtained.2-D Arnold matrix is:

x and y are coordinates of pixel.N is the height or width of simage processed. x and y are the pixel of scrambled image.[5]

6. PLANNING OF WORK Encoding :coding upto DWT: 20th October. Obtaining stego image till 5th November. Decoding Process: till alpha blending 13th November. Reconstruct secret image:25 November.

7. FACILITIES USED MATLAB 2010a and 7.10 version

DECLARATION It is certified that I have checked the availability and feasibility of all the software used in the project and I will try my best for the successful completion of project.

MANISHA (MTE/11/06) M.TECH 3rd Sem. N.C.College of Engineering, Israna,Panipat

10

CERTIFICATE

This is to Certify that Manisha, Roll No. MTE/11/06 Student of M.Tech 3rd SEM (Electronics and Communication Engineering) N.C College of Engineering, Israna has worked under my guidance in the preparation of this Project entitled Modified Secure Digital Image Stenography Based On Discrete Wavelet Transform for the award of degree of Master of Technology in Electronics and Communication Engineering by Kurukshetra University, Kurukshetra.

Ms. Monika Gambhir (Asst. Professor) ECE Department N.C College of Engineering, Israna, Panipat

11

8.REFRENCES [1] Alvaro Martin,Guillerno Sapiro, and Gadiel Seroussi, Is Image Stenography Natural, IEEE Transactions on Image Processing, December 2005. [2] Prabakaran.g, Bhavani.R, A modified Secure Digital Image Stenography Based on Discrete Wavelet Transform, 2012 International Conference on Computing, Electronics and Electrical Technologies[ICCEET], IEEE 2012. [3] Adnan Mohsin Abdulazeez Brifcani and Jwan Nazeeb Al-Bamerny, Image compression Analysis Using Multistage Vector Quantization Based on Discrete Wavelet Transform,2010 International Conference on Methods and Models in Computer Science, IEEE 2010. [4] Rakhi Dubolia, Roop Singh, Sarita Singh Bhadoria, Rekha Gupta, Digital Image Watermarking By Using Discrete Wavelet Transform and Discrete Cosine Transform and Comparison Based on PSNR, 2011 International Conference on Communication Systems and Network Technologies. [5] Lingling Wu, Weitao Den , Jianwei Zhang , Dongyan He, Arnold Transformation

Algorithm and Anti-Arnold Transformation Algorithm , The First International Conference on Information Science and engineering(ICISE2009), 2009.

12

You might also like