Professional Documents
Culture Documents
=
=
1
1
) (
) (
n
i
i
i N i n
C b S f (1)
Fig. 1 How blocks in cover images are visited as raster scan.
In equation (1), b
i
is the value of i-th bit of S
n
. N(i) is also
the number of bits 1 available in S
n
from the first bit to i-th bit.
New values of pixels l
i
and r
i
(r'
i
, l'
I
) are changed in a way
that values of k and f(S
n
) obtained for S
n
satisfy in the
following equations.
) 1 mod( + ' = n l K
i
(2)
n
k i
C r f mod ) S (
n
' =
(3)
Considering equations (2) and (3), maximum distortion
created in pixels l
i
and r
i
after embedding step are
2 /
n
k
C and
2 / ) 1 ( + n respectively, when extracting secret data bits. Using
equations (2) and (3) and having the value of n, values of k
and f(S
n
) can be obtained easily for each block of cover image.
Then by applying function f
--1
according to equation (4), secret
bits embedded in that block can be extracted. In this equation
num is given initial value with value of f(S
n
) and also
, 1 > n
1
0
0
= C .
+
+
+
=
' 1 ' ) 1 , 1 , (
' 1 ' ) 1 , 1 , (
' 0 ' ) , 1 , (
) , , (
1
1 1
1
1
k n num f
k n C num f
k n num f
k n num f
n
k
k n if
k n C num if
C num if
n
k
n
k
<
> >
<
) 1 (
) 1 ( ,
1
1
(4)
III. THE PROPOSED METHOD
Non-adaptive method of Chang et al. [7] has better visual
quality for stego image in the same embedding capacity than
other non-adaptive methods. In the most of non-adaptive
ways, secret bits are replaced by the least significant bits of
each pixel in cover images; while in [7] secret bits are
embedded implicitly by a modulus function in image pixels.
In implicit methods, stego pixels are protected against
different steganalysis attacks [17]-[19]. Because of that we
proposed a new improved solution by making some changes
in Chang et al. method in order to increase the quality of stego
image obtained by this method and decrease the distortions of
hiding secret bits in pixels of cover image.
http://ijetsp.info/article/IJETSPV1I202.pdf
10
International Journal of Emerging Trends in Signal Processing
ISSN(Online)2319-9784, Volume 1 ,Issue 2, January 2013
In a combined function such as
n
k
C , as K approaches to n/2,
the value of the combined function increased. Maximum value
for this function is obtained by equation below.
(
=
=
=
odd is K if n or n k
even is K if n k
C
n
k
2 / 2 /
2 /
) max(
(5)
For example if n=6, maximum value of the combined
function is C
3
6
=20 or if n=5, maximum value of the combined
function is C
2
5
=C
3
5
=10. For example, in Table I, values of K
and f(S
n
) are shown for n=5 which obtained by using equation
(1).
According to Table I, it can be concluded that if K value of
bitstream equals to n or 0, the value of module in equation (3)
equal to 1 and it is not necessary to calculate f(S
n
) and change
r
i
, because there will be only one possible state for placement
of these bits in cover image blocks.
Fig. 2 indicates the number of possible states for replacing
the K bit of value 1 in a 5-bit and 6-bit bitstream. As we can
see in this figure, while K approaches n/2, the value of
combined function which is equal to system module increases.
Table I
VALUES OF K AND f(Sn) OBTAINED WITH CHANG ET AL. METHOD
S
5
K f(S
5
) S
5
K f(S
5
) S
5
K f(S
5
)
00000 0 0 01011 3 1 10110 3 6
00001 1 0 01100 2 5 10111 4 1
00010 1 1 01101 3 2 11000 2 9
00011 2 0 01110 3 3 11001 3 7
00100 1 2 01111 4 0 11010 3 8
00101 2 1 10000 1 4 11011 4 2
00110 2 2 10001 2 6 11100 3 9
00111 3 0 10010 2 7 11101 4 3
01000 1 3 10011 3 4 11110 4 4
01001 2 3 10100 2 8 11111 5 0
01010 2 4 10101 3 5
n=5 n=6
Fig. 2 Different value of f(Sn) in Chang et al. method that obtained from
different value of K (the horizontal axis is equal to value of k and the vertical
axis indicates the maximum value of the module in equation (3)).
When f(S
n
) is being maximized, variation range of function f
(S
n
) can be decreased significantly by changing the values of
K and f(S
n
) to new values K' and f'(S
n
) (K' is equal to 0 or n) as
well as changing the system modulus and decreasing system
modulus (Fig. 3). As maximum value of f(S
n
) decreases,
distortion of r
i
may also be decreased. The proposed Non-
adaptive method, include two steps: embedding the secret data
and extracting them.
Fig. 3 a) how the maximum value of f(Sn) being decreased by reducing the
module and mapping these maximum values to state which k=0 or k=n. 1)n=6
2)n=5. b) The maximum value of module after mapping in our proposed
method.
A. Embedding Secret Data Bits
For embedding secret data bits in our proposed non-
adaptive method, firstly considering the embedding capacity
of blocks are odd or even, then we examined the situation that
the value of f(S
n
) is maximum; If the condition is true , the
value of k and f(S
n
) are mapped to new values of k' and f'(S
n
)
according to equation (6) and (7) (equation (6) used for even
values of n and equation (7) used for odd values of n). As
shown in Fig. 3 (A-2), if the embedding capacity in the block
is odd, maximum values of f(S
n
) change when k= [n/2] or
k=[n/2]. Also if it is even (Fig. 3 (A-1)), then the maximum
values of f(S
n
) change when k=n/2 or k=n/2+1. If the values of
K and f (S
n
) arent satisfied in any available conditions in
equations (6) or (7), there is no need to change the values of
K' and f'(S
n
) (equation (8)).
=
> + =
+ + = ' = '
> =
+ = ' = '
> =
= ' = '
=
1 2 /
1
1 2 /
1 2 /
3
1 ) ( , 1 2 /
2 / 3 1 ) ( ) ( ,
1 ) ( , 1 2 /
1 ) ( ) ( ,
) ( , 2 /
) ( ) ( , 0
3 ) max(
n
even
n
n
n n
n
n n
n
n n
n n
k
module
V S f n k if
V S f S f n k
V S f n k if
V S f S f n k
V S f n k if
V S f S f k
C V
(6)
http://ijetsp.info/article/IJETSPV1I202.pdf
11
International Journal of Emerging Trends in Signal Processing
ISSN(Online)2319-9784, Volume 1 ,Issue 2, January 2013
(
(
(
s =
+ =
> =
=
> =
= ' = '
> =
= ' = '
n
n
n
n
n
odd
n
n
n
n
n
n
k odd
n
n
n
n
n
n n
n
n
n
n
n
n n
C S f n or n k if
C module
C S f n or n k if
C C module
C S f n k if
C S f S f n k
C S f n k if
C S f S f k
1 2 /
1 2 /
2
1 2 /
1 2 /
1
1 2 /
1 2 /
1 2 /
1 2 /
) ( , 2 / 2 /
1
) ( , 2 / 2 /
) max(
) ( , 2 /
) ( ) ( ,
) ( , 2 /
) ( ) ( , 0
(7)
) ( ) ( ,
n n
S f S f k k = ' = ' (8)
After determining the values of K', f'(S
n
) and the module,
considering equations (9) and (10), using a modulus function
values of K' and f'(S
n
) are embedded in pixels l
i
and r
i
.
B. Extracting Secret Data Bits
Like embedding step, stego image is divided into distinct
two-pixel blocks. To extract secret bits, according to equations
(9) and (10) and because the capacity of the block is odd or
even (value of the parameter n and the value of two pixels in
stego block) we calculate the value of K' and f'(S
n
) in each
block. Then according to these values, by equations (11) and
(12) we examined the conditions that the values of K and f(S
n
)
are mapped into new values.
(
=
= '
=
= '
=
= ' = '
=
= '
=
= ' = '
=
= '
other
C module
even is n and n k if
module module
even is n and n k if
module module
even is n and n k or k f
module module
odd is n and n or n k if
module module
odd is n and n k or k if
module module
module r S f
n
k
even
even
even
odd
odd
i n
) 1 2 / (
) 2 / (
) 0 (
) 2 / 2 / (
) 0 (
mod ) (
1
2
1
2
1
(9)
) 1 mod( + = ' n l K
i
(10)
If the conditions are satisfied, the original values of f(S
n
)
and K obtained for the respective block (equation (11) for odd
values of n and equation (12) for even values of n).
Finally, using equation (4) bitstream embedded in any two-
pixel blocks of stego image is extracted. Putting all these
extracted bitstream together the secret message is obtained
from stego image.
(
= ' + ' = =
= ' + ' = =
n k if C S f S f n k
k if C S f S f n k
n
n
n n
n
n
n n
1 2 /
1 2 /
) ( ) ( , 2 /
0 ) ( ) ( , 2 /
(11)
2 / 3 ) ( ,
2 / 3 1 ) ( ) ( , 1 2 /
2 / 3 ) ( ,
1 ) ( ) ( , 1 2 /
0
) ( ) ( , 2 /
1 2 /
1 2 /
1 2 /
n
n
n
n n
n
n
n n
n n
S f n k if
V S f S f n k
S f n k if
V S f S f n k
k if
V S f S f n k
(12)
Example) Assuming that we want to hide the bitstream
S
5
=10100 in the following block using proposed non-adaptive
steganography method.
In the bit stream S
5
, K=2. Also according to equation (1),
f(S
5
)=8. Since these values are applied in equation (7), new
values of K'=0 and f(S
5
) =3 are obtained for this bitstream
when embedding. According to equations (9) and (10) and
considering the module obtained by equation (7), different
values are marked as the value of resulted stego pixels. After
embedding the secret bits, to reduce the distortion, the best
value is selected from marked answers as a final value of
stego pixel for each block. By reducing the distortion in each
block, the quality of resulted stego image is increased.
Eq (1) 8 1 0 1 0 ) (
4
2
3
1
2
1
1
0 5
= + + + = C C C C S f
Eq (7)
= =
= '
= = '
= > =
5 5 10
0
3 5 8 ) 10100 (
5 8 ) 10100 (
5
5
1
module
k
f
C f
Eq (9) 18 ,... 28 , 23 , 18 , 13 .., 5 mod 3 = ' = ' ' =
i i i
r r r
Eq (10) 18 ,... 24 , 18 , 12 ..., 6 mod 0 = ' = ' ' =
i i i
l l l
To extract the bitstream embedded in stego block in this
example, considering the pixels values and embedding
capacity in stego blocks. We do as follows:
Eq (10) 0 6 mod 18 = = ' k
Eq (9) 3 5 mod 18 ) ( 5
5 1
= = ' = S f module
odd
Eq (11) 8 ) ( , 2
5
= = S f k
Eq (4) ) 1 , 3 , 2 ( ' 0 ' 1 ' ) 1 , 4 , 2 ( ' 1 ' ) 2 , 5 , 8 (
1 1 1
+ + + = f f f
' 10100 ' ) 0 , 0 , 0 ( ' 0 '
1010 ' ) 0 , 1 , 0 ( ' 0 ' ' 101 ' ) 0 , 2 , 0 ( ' 1 ' ' 10 '
1
1 1
+ +
+ + + +
f
f f
http://ijetsp.info/article/IJETSPV1I202.pdf
12
International Journal of Emerging Trends in Signal Processing
ISSN(Online)2319-9784, Volume 1 ,Issue 2, January 2013
As it was said earlier, when we embed secret bits in pixels
of cover image by module function, maximum changes
created in the respective pixel in worst case is equal to the half
of system module. According to aforementioned conditions in
equation (5), and considering equations (6) and (7), in worst
case, the maximum changes created in pixel r
i
is
2 / ) 1 (
1 2 /
+
n
n
C
if n is odd and if n is even it is equal to
2 / ) 1 3 ) (max(
1 2 /
+
n n
k
C
.
For example, if n=5 and n=6, maximum changes are 3 and
6 respectively while in Chang et al. method, maximum
changes created in r
i
when n=5 and n=6 equal to 5 and 10
respectively. It shows that our method has outperformed in
reducing the distortion of cover image pixels and has the
better vision quality.
IV. IMPLEMENTATION RESULT
In this section, we shall present our experimental results to
demonstrate the proposed method can perform better than
Chang et al. and K-LSB methods. These results were obtained
using MATLAB 7.1 on Windows XP. Hardware used in this
implementation includes CPU AMD 3000 with 2GB RAM.
Four well-known grayscale cover images, Pepper,
Baboon, Lena, Barbara, shown in Fig. 4, were used as
test image in our experiments. The size of all cover images was
512512. We use a series of pseudorandom number as the
secret data to be embedded into the cover image.
The peak-signal-to-noise ratio (PSNR) was utilized to
evaluate the stego image quality [10]. The PSNR is defined by
equation (14). In equation (13), MSE is the mean squares of
difference between value of pixels in cover image and stego
image.
(13)
=
1
0
1
0
2
, ,
) ( )
1
(
M
i
N
j
j i j i
S C
N M
MSE
dB
MSE
) (
PSNR
b 2
10
1 2
log 10
=
(14)
Here, C
ij
is the pixel of cover image where the coordinate is
(i,j), and S
i,j
is the pixel of stego image where the coordinate is
(i,j). M and N in equations (13) represent the size of the image.
b is the bit depth of cover image. Here we use cover image
with 8 bit depth. When in grayscale images, PSNR is higher
than 30dB, the difference between cover image and stego
image is invisible to the human eyes [10]. A large PSNR value
indicates that pixel values of stego image are very close to
those of cover image.
(a) (b)
(c) (d)
Fig. 4 covers images with size 512512. a)Lena, b)Baboon, c)Pepper, d)
Barbara.
In our experimental results, the embedding capacity of cover
image has been selected in a way that all blocks of cover image
is used for embedding secret bits.
In Fig. 5, maximum system module in Chang et al. method
is compared with our proposed method. As we can see in this
figure, as the capacity of each block increase, the maximum
module in our method decreases more than Chang et al.s
method. Decreasing the module in our method indicates that
the distortion of stego pixels will decrease too.
In Table II, the results of implementing Chang et al. and K-
LSB method are being compared with our proposed method. In
K-LSB method, considering that in each step, K bit of secret
data is being replaced by K least significant bit of each pixel,
maximum changes creating in each stego pixel is 2
K
-1. So it
can be concluded from Table II that the maximum distortion in
our non-adaptive method is less than two other non-adaptive
methods and the PSNR obtained in our method is higher than
others.
http://ijetsp.info/article/IJETSPV1I202.pdf
13
International Journal of Emerging Trends in Signal Processing
ISSN(Online)2319-9784, Volume 1 ,Issue 2, January 2013
Fig. 5 comparison of the maximum module on pixel ri in our proposed method
with Chang et al. method (horizontal axis is equal to the value of k and
vertical axis is equal to maximum module).
Table II
COMPARISON OF THE PSNR VALUE IN CHANG ET AL. METHOD
FOR 4 COVER IMAGES WITH THE PSNR VALUE IN OUR PROPOSED
NON-ADAPTIVE METHOD
PSNR (dB) Method capacity
(bit)
n
Cover Image with Size 512512
Barbara Pepper Baboon Lena
54.14 54.16 54.14 54.13 Chang 131072 1
54.14 54.16 54.14 54.13 Our
51.53 51.52 51.52 51.52 Chang 262144 2
51.53 51.52 51.52 51.52 Our
48.12 48.12 48.14 48.14 Chang 33216 3
48.12 48.12 48.14 48.14 Our
45.18 45.19 45.17 45.18 Chang 524288 4
46.55 46.55 46.55 46.56 Our
41.53 41.54 41.55 41.55 Chang 655360 5
43.63 43.66 43.66 46.64 Our
37.35 37.38 37.35 37.37 Chang 786432 6
40.28 40.27 40.27 40.27 Our
32.42 32.52 32.46 32.45 Chang 917504 7
35.61 35.50 35.64 35.62 Our
For example, assuming that the number of bits able to be
embedded in each pixel of cover image is 3 bits (total capacity
in cover image is 524288 bits), then the maximum pixel
changes creating in each block is:
Since in equation (14), square difference between
corresponding pixels in cover image and stego image is being
considered for calculating PSNR value, according to above
example and Table III, the PSNR value in our non-adaptive
method is higher than two other methods.
The sample stego image produced by Chang et al. method
and our proposed method are shown in Fig. 6. As we can see
in this figure, image quality in our method is higher than
Chang et al. method. Considering that there has been
suggested many steganalysis attack for LSB-based
steganography methods, these methods have low security. So
our proposed method is superior to K-LSB method in both the
quality and the security of stego image.
Table III
COMPARISON OF THE RESULTED PSNR VALUES IN OUR METHOD
WITH K-LSB AND CHANG ET AL. METHODS
PSNR (dB) Capacity Cover
Our
Proposed
Method
Chang et
al. [7]
Method
K-LSB
[4]
Method
(bit) Images
( 215 215 )
51.52 51.52 51.15 262144 Lena
46.56 45.18 44.15 524288
40.27 37.37 37.92 786432
51.52 51.52 51.14 262144 Baboon
46.55 45.17 44.15 524288
40.27 37.35 37.92 786432
51.52 51.52 51.13 262144 Pepper
46.55 45.19 44.15 524288
40.27 37.38 37.92 768432
(a)
(b) (c)
Fig. 6 a) Cover image of 'Lena'. b) Resulted stego image using Chang et al.
method with the capacity of 1048576 bit. c) Resulted stego image using our
proposed method with the capacity of 1048576 bit.
V. CONCLUSION
In this paper a new non-adaptive steganography method
was suggested for embedding the secret data in cover images.
In this paper we could decrease distortions resulting from
embedding secret bits in cover image pixels in Chang et al.
method and increasing the quality of stego image by reducing
the module of embedding and pixel changes. Implementation
result in section IV, confirms that using our proposed method,
the stego image quality is improved.
REFRENCES
[1] P. Bateman, "Image Steganography and Steganalysis. Hide and Seek",
IEEE Secur. Priv., 2008.
[2] A. Chedad, J. Condell, K. Curran, P.-M. Kevitt, "Digital Image
Steganography: Survey and Analysis of Current Methods", Signal
Process. , vol. 90, pp. 727752, 2010.
http://ijetsp.info/article/IJETSPV1I202.pdf
14
International Journal of Emerging Trends in Signal Processing
ISSN(Online)2319-9784, Volume 1 ,Issue 2, January 2013
[3] Z. Liao, Y. Huang, C. Li, "Research on Data Hiding Capacity", Int. J.
Netw. Secur., vol. 5, pp. 140144, 2007.
[4] W. Bender, D. Gruel, N. Morimoto, A. Lu, "Techniques for Data
Hiding", IBM Syst. J., pp. 313316, 1996.
[5] C.C. Thien, J.C. Lin, "A Simple and High-hiding Capacity Method for
Hiding digit by digit Data in Images Based on Modulus Function",
Pattern Recogn. vol. 12, pp. 28752881, 2003.
[6] C.K. Chan, L.M. Cheng, "Hiding Data in Images by Simple LSB
Substitution", Pattern Recogn., pp. 469474, 2004.
[7] C.C. Chang, C.Y. Lin, Y.Z. Wang, "New image steganographic methods
using run-length approach", Inform. Sciences, pp. 3393-3408., 2006.
[8] N. Tiwari, M. Shandilya, "Evaluation of Various LSB based Methods of
Image Steganography on GIF File Format", Int J Comput Appl., vol. 2,
pp. 1-4, 2010.
[9] R. Chandramouli, M. Kharrazi, N. Memon, "Image Steganography and
Steganalysis: Concepts and Practice", Proc. Int. Digital Watermarking
(IWDW), 2003.
[10] N. Wu, M. S. Hwang, "Data Hiding: Current Status and Key Issues",
Int. J. Netw. Secur., vol. 4, pp. 19, 2007.
[11] K.B. Shiva Kumar, K.B. Raja, R.K. Chhotaray, S. Pattanaik, "Bit
Length Replacement Steganography based on DCT Coefficients", Int. J.
Eng. Sci. Tech., vol. 8, pp. 3561-3570, 2010.
[12] S. Khaire, S.-L. Nalbalwar, "Review: Steganography Bit Plane
Complexity Segmentation (BPCS) Technique", Int. J. Eng. Sci. Tech.
vol. 9, pp. 4860-4868, 2010.
[13] X. Li., B. Yang, D.F. Cheng, Y. Zeng, "A Generalization of LSB
Matching", IEEE Sig. Process. Let. , 2009, vol. 2, pp. 6972, 2009.
[14] R.Z. Wang, C.F. Lin, J.C. Lin, "Image hiding by optimal LSB
substitution and genetic algorithm", Pattern Recogn. vol. 34, pp. 671-
683, 2001.
[15] S.J. Wang, "Steganography of capacity required using modulo operator
for embedding secret image", Appl. Math. Comput. , vol. 164, pp. 99-
116, 2005.
[16] K. Curran, X. Li, R. Clarke, " An investigation into the use of the least
significant bit substitution technique in digital watermarking", J. Appl.
Sciences, vol.2, pp. 648-654, 2005.
[17] J. Fridrich, M. Goljan, R. Du, "Reliable detection of LSB steganography
in grayscale and color images", Proc. ACM multimedia secur.
(MM&SEC'2001), pp. 27-30, 2001.
[18] A. Ker, "Steganalysis of LSB Matching in Grayscale Images", IEEE
Signal Proc. Let., 2005.
[19] I. Avcibas, N. memon, B. Sankur, "Steganalysis of watermarking
techniquies using image quality metrics", Proc. SPIE, pp. 523-531,
2001.
http://ijetsp.info/article/IJETSPV1I202.pdf
15
International Journal of Emerging Trends in Signal Processing
ISSN(Online)2319-9784, Volume 1 ,Issue 2, January 2013