Professional Documents
Culture Documents
High PSNR Based Image Steganography
High PSNR Based Image Steganography
Abstract—Steganography is a method for inserting digital Noise Ratio, SSIM or Structural Similarity Index, and the
data within a different digital medium like text, pictures, capacity along with the robustness and securities. [1,2]
sound signals, or film signals, while not exposing its Robustness is ability of the stego image which is hidden
occurrence in the medium. Information safekeeping is an against different attacks with security as the inability of the
essential necessary domain in correspondence medium adversary for detecting the hidden image which are
over the web system. In this paper, working for improve accessible only for the authorized users. [5] Steganalysis
the performance of Image Steganography. Results are can be used for the purpose of detecting all the secret
showing comparison in between DCT-SVD and LWT- information [5]. Images which are digital can be mostly
DCT-SVD. PSNR of proposed methodology is high as transmitted with the help of the internet along with
compare to DCT-SVD. multimedia information. This is why the importance is for
Keyword—-Steganography, DCT, LSB-DCT, threshold, the purpose of protecting them. There are many different
PSNR, Chaos, PWLCM, FLD, LWT-DCT-SVD. types of images which can be easily covered with Bitmap
File Format (BMP), Graphics Interchange Format (GIF),
I. INTRODUCTION Joint Photographic Experts Groups (JPEG) images. All the
Today, overall need for the purpose of protecting all research are mostly about the BMP images. It can also be
the digital information had becomes a very essential topic. studied that steganopraphic ways which embed message in
Steganography is a work which is a combination of work LSB or Least Significant Bit of the DCT coefficient. All
steganos and graphos which means hidden writing. This is the embedding can be completed by two methods, random
the secret of information with other carriers such as videos, and sequential. Problems with sequential is the
images, graphics and documents for the purpose of getting vulnerability, secret messages can be very easily detected.
the stego object as it won't be affected after the insertion. Another proposed improvement is of the technique that is
By this method, only receivers will understand if there is applied in the literature of LSB and DCT with the
any secret message and can get it back. Steganography can threshold, it can also hide the data at random location
be divided into two domains, frequency and spatial [1]. which are based on threshold. [7] Problem with limited
For first domain, modifications can be made for the pixels capacity which is related to taken threshold. It can also be
of the real image. Secret image is added directly in the broken without any problem as you discover this
pixels. Second domain, will have the carrier image which threshold. This is why the overall purpose of these paper is
can be transformed from spatial domain into the frequency to provide a very novel image DWT way for the high
domain with the help of the techniques like domain embedding capacity and provide more security for the
transformation. The hidden message is then put into all purpose of using the chaotic generator for the Piece Wise
these pixels. Second domain, in which all the carrier Linear Chaotic Map or PWLCM.
images are transformed with the coefficient with cover for For the purpose of hiding any hidden data in the
forming the stego image [1,2]. Frequency domain can have image, which is present in the big variety of steganography
different advantages, as it’s more robust than the spatial technique some of the available data is a lot more complex
technique, it can tolerate the shrinking, cropping, image if compared with others and they have their own respective
manipulation etc. [1,2,3]. As there are different weak and strong points. Other application are there which
transformation which are used in the map for signaling it can need complete invisibility for the secret information,
into frequency domain. [3] all the top methods which are there are some others which can need a big s ecret for the
used in literature are DFT or Discrete Fourier Transform, hidden data. In such cases Steganography will exploit
DWT or Discrete wavelet Transform or DCT Discrete human precipitation, most of the human senses are not
Cosine Transform. [1,3] worked for looking for the files which have the required
Many metrics are there which are used for the information for the secret data which in in them, as there
purpose of evaluating the steganography method, which are some programs available which can do
are MSE or Mean Square Error, PSNR or Peak Signal to Steganalysiswhich is detecting the use of the
Replace the LSB of these defined coefficients with the Fig 4:- Decomposing of Image by LWT
MSB of the secret data.
In comparison with other wavelet transforms
Apply 2D Inverse DCT to get the final stego image.
reconstruction of the image by LWT is good, because it is
Sharing the initial conditions of the chaotic generator
increases the smoothness and reduces aliasing effect. It
and the secret image size with the receiver, he will
requires less memory and less computational cost almost
generate the same random sequence, and apply the
half of DWT. LWT reduces loss in information, increases
extraction algorithm.
intactness of embedded watermark in the image and helps
B. Extraction algorithm to increase the robustness of watermark [3].
The steps of the secret image extraction applied by
the receiver are:
Read the stego image.
Divide the stego image into 8�8 blocks and apply 2D
DCT on each block.
V. RESULTS
In the Result session, comparing the performance of
the results. In this chapter, compare the Steganogrpahy
method.