Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 27

SECURE SKIN TONE BASED STEGANOGRAHY USING WAVELET TRANSFORM

PROJECT BY: DIVYA MATHEW JIBIN JAMES MANOJ M MEGHA S GEORGE MOHAMMED AL-FAWAZ PROJECT GUIDE: DR. VINU THOMAS

INTRODUCTION


 

Steganography: The art of hiding the existence of data in another transmission medium to achieve secret communication. Cover image + Secret message=Stego image Characteristics  Imperceptibility  Robustness  Statistically undetectable Skin-tone region: Skin tone detection is performed in HSV Wavelet transform: 2D DWT

Embedding block diagram:

Extraction block diagram:

IMAGE LOADING
 M*n sized image is loaded

ORIGINAL IMAGE

SKIN DETECTION
 HSV colour space  RGB to HSV

 Threshold chosen as [h1, s1] & [h2, s2]

IMAGE IN HSV COLOUR SPACE

CONTD.


Pixel is classified as skin pixel if [h, s] is in the range H_range = [0, 0.11] and S_range = [0.2, 0.7]. Put skin pixel as 1 & other as 0

INTERMEDIATE IMAGE

SKIN TONE DETECTION ALGORITHM

CROPPING


Done on mask image Cropped area act as key at decoding side Cropping is done interactively Provides enhanced security

DWT


2D Haar DWT is employed. Splits components into sub bands -LL, LH, HL,HH Can hide data in LH, HL, HH sub bands as they are less sensitive to human eyes Best performance in terms of computation time. Computation speed is high.
10

2D HAAR DWT


Step 1: At first, scan the pixels from left to right in horizontal direction. Then, perform the addition and subtraction operations on neighboring pixels

Step 2: Perform the addition and subtraction operations on neighboring pixels and then store the sum on the top and the difference on the bottom

11

a)Original image

b)Image after applying first order 2D Haar Dwt

Filter bank structure


 

The digital filter bank is set of bandpass filters with either a common input or a summed output An M-band analysis filter bank is shown below

An L-band synthesis filter bank is shown below -

13

Boundary handling
 

Two common boundary policies are circular convolution and padding: Circular convolution:

14

Mirror padding:


Here the signal is mirrored at the boundary. The storage space in the wavelet domain is physically enlarged by each iteration step

EMBEDDING ALGORITHM


Suppose C is the original 8 bit cover image of Mc x Nc pixels. It is denoted as: C={xij, yij, z ij | 1 < i < Mc, 1 < j < Nc, xij,yij, z ij {0,1,2,,255}} S is the n-bit secret message represented as: S={Si | 1 < i < n, Si {0,1}} Embedding message bit in all pixels of a group using LSB substitution. The mathematical representation for LSB is: xi = xi xi mod 2k + mi The extracted message is represented as mi =xi mod 2k

Grouping nine neighboring pixels of image into one:

The group of pixels in an image is selected in the random order. The random order can be generated by using linear feedback shift register.

FF

FF

FF

DECODING PROCESS

MERGING


Merge the cropped stego image with original image to get the stego image of size MN. To perform merging we require coefficients of first and last pixels of cropped area in original image.

19

SKIN TONE DETECTION




INPUT:

20

HSV output image:

21

22

Mask image:

23

24

HARDWARE IMPLEMENTATION


The hardware implementation is done using DSP Starter Kit DSK TMS 320C6713. Features of TMS 320C6713 at 225 MHz:
Eight 32-Bit Instructions/Cycle 32/64-Bit Data Word 225-, 200-MHz (GDP), and 200-, 167-MHz (PYP) Clock Rates 4.4-, 5-, 6-Instruction Cycle Times 1800/1350, 1600/1200, and 1336/1000 MIPS /MFLOPS Four ALUs (Floating- and Fixed-Point) Two Multipliers (Floating- and Fixed-Point) Load-Store Architecture With 32 32-Bit General-Purpose Registers Instruction Packing Reduces Code Size

CODE COMPOSER STUDIO




 

Code Composer Studio is an integrated development environment for developing applications for Texas Instruments embedded processors. CCS includes support for OS level application debug as well as low-level JTAG based development. Implemented one-level 2D DWT Interfaced DSK TMS320C6713.

CONCLUSION


Fascinating scientific area which falls under the umbrella of security systems No one can extract message without having the value of cropped region and pseudo random code key. Provides fine image quality.

27

You might also like