Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 31

AN EFFICIENT DATA EMBEDDING TECHNIQUE

USING IMAGE AS DIGITAL MEDIA

UNDER THE GUIDANCE OF


V.VENKATESWARA REDDY

By Pavithra S R
1SJ11LSP08
CONTENTS
Abstract
Introduction
LiteratureSurvey
Theoretical Analysis
Experimental Investigations
Experimental Results
Discussion of Results 
 Significance

Conclusion
Future enhancement
Reference
Publication of papers
ABSTRACT

 The purpose of steganography is to conceal the fact that


some communication is taking place. Securing the
information is required to prevent thefting of data.
Steganography hides the message in digital media
 The APPM method offers lower distortion by
providing more compact neighbourhood sets and allowing
embedded digits in any notational system.
 Image distortion occurs when pixel values are modified
because of data embedding.
 We use MSE to measure the image quality.

 A smaller MSE indicates that the stego image has better


image quality.
CONTINUED……..

 Thus, the best image quality can be found when


the MSE value is very small or going to be zero
since the difference between the original and
reconstructed image is negligible.
 However, PSNR values between 20 and 50dB
can be considered as typical values. Moreover,
the higher the PSNR value of a stego image, the
better the degree of hidden message
imperceptibility.
INTRODUCTION

Steganography
 Steganography is the art of hiding information
imperceptibly in a cover medium.

 The word “Steganography” is of Greek origin


and means “covered or hidden writing”. The
main aim in steganography is to hide the very
existence of the message in the cover medium.
LITERATURE SURVEY

EXISTING METHODS

 LSB substitution

 OPAP

 EMD

 DE
DIAMOND ENCODING
 ( x , y )   (x , y ) | | a - x |  | b - y | k }
k2
k 1
DIAMOND ENCODING
DIAMOND ENCODING

B  2  32  2  3  1  25
embed 1425
( x ', y ')  (11,12)  14
extract
f ( x ', y ')  f (11,12)  (7 11  12) mod(25)  14
ANALYSIS OF THE PROJECT
CONTINUED….

Extraction Function and Neighborhood Set


Evaluation of Steganographic Capacity (Payload)
Evaluation of Imperceptibility
Evaluating the Quality of Digital Images  
Objective Quality Evaluation (Automated
Evaluation)
Evaluating the Quality of Stego Images  
To calculate MSE for different methods of data
embedding:
 For LSB method
 For OPAP method

 For APPM method


1) EXTRACTION FUNCTION AND
NEIGHBORHOOD SET

In this module we perform the action of extraction


function and neighborhood set. Where the system does a
new data embedding method to reduce the embedding
impact by providing a simple extraction function and a
more compact neighborhood set.
2) EMBEDDING PROCEDURE

Input: Cover image, secret bit


stream, and key.

Output: Stego image


3) EXTRACTION PROCEDURE

 To extract the embedded message digits.


pixel pairs are scanned in the same order as
in the embedding procedure. The embedded
message digits are the values of extraction
function of the scanned pixel pairs

 Input: Stego image

 Output: Secret bit stream.


4) STATISTICAL ANALYSIS OF THE HISTOGRAM
DIFFERENCES

 In this module, we perform the goal of system


analysis by using histogram technique. The goal of
steganography is to evade statistical detection. It is
apparent that MSE is not a good measure of security
against the detection of steganalysis.
EXPERIMENTAL INVESTIGATIONS

 PSNR is used in many image processing applications


and considered as a reference model to evaluate the
efficiency of other objective image quality evaluation
methods.
 While the MSE measures the difference between these
two images.
 Thus, the best image quality can be found when the
MSE value is very small or going to be zero
 However, PSNR values between 20 and 50dB can be
considered as typical values. Moreover, the higher the
PSNR value of a stego image, the better the degree of
hidden message imperceptibility.
The MSE is the statistical difference in the pixel values between
the original and the reconstructed image. Moreover, PSNR and
MSE are defined as follows.
MSE comparison of the proposed method with LSB and
OPAP and PSNR of APPM method
EXPERIMENTAL RESULTS

(a) Cover image (b) Stego image ,at the payload 2bpp and the PSNR is 49dB.
For the payload of 2 bpp the input image and output image are shown in the
figure .and the MSE and PSNR for the payload of 2 bpp are 1.344 and
49dB.
FOR OPENING THE GUI OF DATA EMBEDDING

 GUI of data embedding


AFTER DATA IS EMBEDDED IN COVER
IMAGE
AFTER DATA EXTRACTION
DISCUSSION OF RESULTS 
SIGNIFICANCE
 Hiding data on the network in case of a breach.
 Peer-to-peer private communications.
 Posting secret communications on the Web to
avoid transmission.
 Embedding corrective audio or image data in
case corrosion occurs from a poor connection
or transmission.
 
CONCLUSION
 APPM method is Simple and efficient and allows users to select
digits in any notation system embedding and also it offer small
MSE compared with OPAP and DE.
 This APPM method addresses and improves these two
fundamental aspects of digital steganography methods like
steganographic capacity and stego image quality.
 This proposed novel steganography methods in order to
increase the steganographic capacity and enhance the
imperceptibility (i.e. stego image quality). Additionally, it
examined the reliability of PSNR, a principal measure used to
evaluate the performance of image based steganography
methods through measuring the quality of their stego images
FUTURE ENHANCEMENT
 Steganography goes well beyond simply hiding text
information in an image. Steganography applies not only to
digital images but to other media as well, such as audio
files, communication channels, and other text and binary
files.
 It is expected that our adaptive idea can be extended to other
steganographic methods such as audio/video steganography
in the spatial or frequency domains.
 Currently, the length of the message file has some
limitations for the image Steganography, so for the same, we
can have support for a wider size of files.
REFERENCE
[1] Ingemar J. Cox, J.Fridrich, “Digital Watermarking and Steganography” second edition, Morgan Kaufmann
Publishers, Press, 2008.
[2] N. Provos and P. Honeyman, “Hide and seek: An introduction to steganography,” IEEE Security Privacy,
vol. 3, no. 3, pp. 32–44, May/Jun. 2003.
[3] A. Cheddad, J. Condell, K. Curran, and P. McK evitt, “Digital image steganography: Survey and analysis of
current methods,” Signal Process., vol. 90, pp. 727–752, 2010.
[4] A. D. Ker, “Steganalysis of LSB matching in gray scale images,” IEEE Signal Process. Lett., vol. 12, no. 6,
pp. 441–444, Jun. 2005.
[5] S. Lyu and H. Farid, “Steganalysis using higher-order image statistics,”IEEE Trans. Inf. Forensics Security,
vol.1, no. 1, pp. 111–119, Mar.2011.
[6] C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol.
37, no. 3, pp. 469–474, 2004.
[7] J. Mielikainen, “LSB matching revisited,” IEEE Signal Process. Lett., vol. 13, no. 5, pp. 285–287, May 2006.
[8] X. Zhang and S. Wang, “Efficient steganographic embedding by exploiting modification direction,” IEEE
Commun. Lett, vol. 10, no. 11, pp. 781–783, Nov. 2006.
[9] R.M.Chao,H.C.Wu,C.C.Lee, and Y.P.Chu, “A novel image data hiding scheme with diamond encoding,”
EURASIP J. Inf. Security, vol.2009, 2009, DOI: 10.1155/2009/658047, Article ID 658047.
[10] J. Wang, Y. Sun, H. Xu, K. Chen, H. J.Kim, and S.H.Joo, “An improved section-wise exploiting
modification direction method,” Signal Process., vol. 90, no. 11, pp. 29
54–2964, 2010.
[11]http://en.wikipedia.org/wiki/Steganography
[12]http://www.sans.org/reading_room/whitepapers/covert/steganography-matters-post-911-world_676
PUBLICATION OF PAPERS

 Presented paper entitled “An Efficient Data Embedding


Technique Using Image As A Digital Media” in International
conference named as “MANTHAN’13” held on 24th of Feb
2013 organized by global research association for development
and excellence (grade).and published the paper in IJREAS
Volume 3(march 2013), Issue 3 ., ISSN: 2249-3905 (
http://www.euroasiapub.org), pp.68-76.

 Presented a paper entitled “An Efficient Data Embedding


Technique Using Image As A Digital Media” in National
Conference on ‘Recent Trends in Communication and
Networking 2013’ held on 28th march 2013 organized by
Department of Telecommunication Engineering, Don Bosco
Institute of Technology, Bangalore.
THANK
YOU

You might also like