Professional Documents
Culture Documents
Secure Skin Tone Based Steganograhy Using Wavelet Transform
Secure Skin Tone Based Steganograhy Using Wavelet Transform
PROJECT BY: DIVYA MATHEW JIBIN JAMES MANOJ M MEGHA S GEORGE MOHAMMED AL-FAWAZ PROJECT GUIDE: DR. VINU THOMAS
INTRODUCTION
Steganography: The art of hiding the existence of data in another transmission medium to achieve secret communication. Cover image + Secret message=Stego image Characteristics Imperceptibility Robustness Statistically undetectable Skin-tone region: Skin tone detection is performed in HSV Wavelet transform: 2D DWT
IMAGE LOADING
M*n sized image is loaded
ORIGINAL IMAGE
SKIN DETECTION
HSV colour space RGB to HSV
CONTD.
Pixel is classified as skin pixel if [h, s] is in the range H_range = [0, 0.11] and S_range = [0.2, 0.7]. Put skin pixel as 1 & other as 0
INTERMEDIATE IMAGE
CROPPING
Done on mask image Cropped area act as key at decoding side Cropping is done interactively Provides enhanced security
DWT
2D Haar DWT is employed. Splits components into sub bands -LL, LH, HL,HH Can hide data in LH, HL, HH sub bands as they are less sensitive to human eyes Best performance in terms of computation time. Computation speed is high.
10
2D HAAR DWT
Step 1: At first, scan the pixels from left to right in horizontal direction. Then, perform the addition and subtraction operations on neighboring pixels
Step 2: Perform the addition and subtraction operations on neighboring pixels and then store the sum on the top and the difference on the bottom
11
a)Original image
The digital filter bank is set of bandpass filters with either a common input or a summed output An M-band analysis filter bank is shown below
13
Boundary handling
Two common boundary policies are circular convolution and padding: Circular convolution:
14
Mirror padding:
Here the signal is mirrored at the boundary. The storage space in the wavelet domain is physically enlarged by each iteration step
EMBEDDING ALGORITHM
Suppose C is the original 8 bit cover image of Mc x Nc pixels. It is denoted as: C={xij, yij, z ij | 1 < i < Mc, 1 < j < Nc, xij,yij, z ij {0,1,2,,255}} S is the n-bit secret message represented as: S={Si | 1 < i < n, Si {0,1}} Embedding message bit in all pixels of a group using LSB substitution. The mathematical representation for LSB is: xi = xi xi mod 2k + mi The extracted message is represented as mi =xi mod 2k
The group of pixels in an image is selected in the random order. The random order can be generated by using linear feedback shift register.
FF
FF
FF
DECODING PROCESS
MERGING
Merge the cropped stego image with original image to get the stego image of size MN. To perform merging we require coefficients of first and last pixels of cropped area in original image.
19
INPUT:
20
21
22
Mask image:
23
24
HARDWARE IMPLEMENTATION
The hardware implementation is done using DSP Starter Kit DSK TMS 320C6713. Features of TMS 320C6713 at 225 MHz:
Eight 32-Bit Instructions/Cycle 32/64-Bit Data Word 225-, 200-MHz (GDP), and 200-, 167-MHz (PYP) Clock Rates 4.4-, 5-, 6-Instruction Cycle Times 1800/1350, 1600/1200, and 1336/1000 MIPS /MFLOPS Four ALUs (Floating- and Fixed-Point) Two Multipliers (Floating- and Fixed-Point) Load-Store Architecture With 32 32-Bit General-Purpose Registers Instruction Packing Reduces Code Size
Code Composer Studio is an integrated development environment for developing applications for Texas Instruments embedded processors. CCS includes support for OS level application debug as well as low-level JTAG based development. Implemented one-level 2D DWT Interfaced DSK TMS320C6713.
CONCLUSION
Fascinating scientific area which falls under the umbrella of security systems No one can extract message without having the value of cropped region and pseudo random code key. Provides fine image quality.
27