Professional Documents
Culture Documents
I. INTRODUCTION
The word steganography is derived from the Greek words
stegos meaning cover and grafia meaning writing [1]
defining it as covered writing. Image steganography the
information is hidden exclusively in images.
Steganography is the art and science of secret Figure 1.2 Simple Steganographic Model
communication. It is the practice of encoding/embedding
secret information in a manner such that the existence of Applications of Steganography
the information is invisible. The actual files can be referred (a) Secret Communications [13] the use steganography
to as cover text, the cover image, or cover audio message. does not advertise secret communication and therefore
After inserting the secret message it is referred to as stego- avoids scrutiny of the sender side, message, and
medium. A stego-key has been used for hiding encoding recipient. A secret, blueprint, or other sensitive
process to restrict detection or extraction of the embedded information can be transmitted without alerting
data [2]. potential attackers.
Watermarking and fingerprinting related to steganography (b) Feature Tagging Elements can be embedded inside an
are basically used for intellectual property protection image, as the names of individuals in a photo or
needed. A digital watermark is a kind of marker covertly locations in a map. Copy the stego-image also copies
embedded in a noise-tolerant signal such as audio or image all of the embedded features and only parties who
data. It is typically used to identify ownership of the possess the decoding stego-key will be able to extract
copyright of such signal. and view the features.
The embedded information in a watermarked object is a (c) Copyright Protection Copy protection mechanisms that
signature refers the ownership of the data in order to ensure prevent data, generally digital data, from being copied.
copyright protection. In fingerprinting, different and
specific marks are embedded in the copies of the work that II. SYSTEM MODULE
different customers get. In this case, that becomes easy for Steganography hide the messages inside the Cover
the property owner to find out such customers who give medium, Many Carrier formats. Breaking of steganography
themselves the right to violate their licensing agreement is known as Steganalysis.
when they illegally transmit the property to other groups
[1][7].
www.ijcsit.com 685
Parmar Ajit Kumar Maganbhai et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 685-688
www.ijcsit.com 686
Parmar Ajit Kumar Maganbhai et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 685-688
embedded inside the cover image, in order that the Stego- IV. MOTIVATION
Image becomes standalone information to the receiver. In steganography, the message is embedded into the digital
Results show that the algorithm has a high capacity and a media rather than encrypting it. The digital media contents,
good invisibility. Moreover Peak Signal to Noise Ratio called the cover, can be determined by anybody, the
(PSNR) of stego image with cover image shows better message hidden in the cover can be detected by the one
result in comparison with other existing steganography having the true key. The message in the message after the
approaches. The satisfactory security is maintained in this receiver gets the data. That allows steganography to protect
research. the embedded information after it is decrypted.
In the year of 2012 Hemalatha, S, Acharya, U.D. and Steganography is therefore broader than cryptography.
Renuka [6] presented integer Wavelet Transform (IWT) is Signal processing area includes- filtering, de-noising
used to hide the key thus it is very secure and robust method, interference suppression, radar signal processing,
because no one can realize the hidden information and it electromagnetic wave propagation, and wireless
cannot be lost due to noise or any signal processing communication systems. The area of the image processing
operations. Result shows very good Peak Signal to Noise applications includes steganography, watermarking [3].
Ratio, which is a measure of security. In this method the
secret information is hidden in the middle bit-planes of the V. CONCLUSIONS
integer wavelet coefficients in high frequency sub-bands. We have studied for improving the steganalysis
In the 2012 Reddy, H.S.M., Sathisha, N. and Kumari, A. performance and also analyzing the hiding capacities of the
[7] worked on the steganography is used to hide. Secure existing research work. The steganalysis performance of
Steganography using Hybrid Domain Technique (SSHDT). state-of-the-art detectors is near-perfect against current
The cover image of different formats and sizes are steganographic schemes. A novel, robust and secure hiding
considered and resized to dimensions of power of 2. The schemes that can resist steganalytic detection must be
Daubechies Lifting Wavelet Transforms (LWT) is applied implemented. Hiding schemes are characterized by three
on cover image to generate four sub bands XA, XH, XV complementary requirements- security against steganalysis,
and XD. The XD band is considered and divided into two robustness beside distortions in the transmission channel,
equal blocks say upper and lower for payload embedding. and capacity in terms of the embedded method. This work
The payload of different formats are considered and resized would be able to be extended for different formats of
to dimensions of power of 2. The payload is fragmented images. This work may be extended using other transforms
into four equal blocks. The Decision Factor Based methods also.
Manipulation (DFBM) is used to scramble further stego
object to improve security to the payload. Dubechies REFERENCES
Inverse LWT (ILWT) is applied on XA, XH, XV and XD [1]. Soni, A.; Jain, J.; Roshan, R., "Image steganography using discrete
fractional Fourier transform," Intelligent Systems and Signal
stego objects to obtain stego image in spatial domain. It has Processing (ISSP), 2013 International Conference on , vol., no.,
been observed that PSNR and embedding capacity of the pp.97,100, 1-2 March 2013.
proposed algorithm is better compared to the existing [2]. Akhtar, N.; Johri, P.; Khan, S., "Enhancing the Security and
algorithm. Quality of LSB Based Image Steganography," Computational
Intelligence and Communication Networks (CICN), 2013 5th
With the rapid development of internet and wide International Conference on , vol., no., pp.385,390, 27-29 Sept.
application of multimedia technology, people can 2013.
communicate the digital multimedia information such as [3]. Das, R.; Tuithung, T., "A novel steganography method for image
digital image, with others conveniently over the internet. In based on Huffman Encoding," Emerging Trends and Applications
in Computer Science (NCETACS), 2012 3rd National Conference
numerous cases, image data, transmitted over a network are on , vol., no., pp.14,18, 30-31 March 2012.
expected not to be browsed or processed by illegal [4]. Hemalatha, S.; Acharya, U.D.; Renuka, A.; Kamath, P.R., "A
receivers. Consequently, the security of digital image has secure image steganography technique using Integer Wavelet
attracted much attention recently and many different Transform," Information and Communication Technologies
(WICT), 2012 World Congress on , vol., no., pp.755,758, Oct. 30
methods for image encryption have been proposed, such as 2012-Nov. 2 2012.
[5] Optical systems are of growing interest for image [5]. Prabakaran, G.; Bhavani, R.; Rajeswari, P.S., "Multi secure and
encryption because of their distinct advantages of robustness for medical image based steganography scheme,"
processing 2-dimensional complex data in parallel at high Circuits, Power and Computing Technologies (ICCPCT), 2013
International Conference on , vol., no., pp.1188,1193, 20-21 March
speed. In the past, many optical methods have been 2013.
proposed in [9]. Among them the most widely used and [6]. Thenmozhi, S.; Chandrasekaran, M., "Novel approach for image
highly successful optical encryption scheme is double stenography based on integer wavelet transform," Computational
random phase encoding proposed in [4]. It can be shown Intelligence & Computing Research (ICCIC), 2012 IEEE
International Conference on , vol., no., pp.1,5, 18-20 Dec. 2012.
that if these random phases are statistically independent [7]. Reddy, H.S.M.; Sathisha, N.; Kumari, A.; Raja, K.B., "Secure
white noise then the encrypted image is also a stationary steganography using hybrid domain technique," Computing
white noise. In some schemes [2] [3] [5], chaos based Communication & Networking Technologies (ICCCNT), 2012
functions are used to generate random phase mask. Such as Third International Conference on , vol., no., pp.1,11, 26-28 July
2012.
the generalization of the conventional Fourier transform [8]. Masud Karim, S.M.; Rahman, M.S.; Hossain, M.I., "A new
[4]. approach for LSB based image steganography using secret key,"
Computer and Information Technology (ICCIT), 2011 14th
International Conference on , vol., no., pp.286,291, 22-24 Dec.
2011.
www.ijcsit.com 687
Parmar Ajit Kumar Maganbhai et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (1) , 2015, 685-688
[9]. Tataru, R.L.; Battikh, D.; Assad, S.E.; Noura, H.; Deforges, O., [16] B. M. Hennelly, J.T. Sheridan, “Image encryption and the
"Enhanced Adaptive Data Hiding in Spatial LSB Domain by using fractional Fourier transform”, Optik - International Journal for
Chaotic Sequences," Intelligent Information Hiding and Light and Electron Optics, Volume 114 Issue 6, pp 251–265, 2003.
Multimedia Signal Processing (IIH-MSP), 2012 Eighth [17] Yuhong Zhang, Fenxia Zhao, “The algorithm of fractional Fourier
International Conference on , vol., no., pp.85,88, 18-20 July 2012. transform and application in digital image encryption”,
[10]. Keshari, S.; Modani, S.G., "Weighted fractional Fourier Transform International Conference on Information Engineering and
based image Steganography," Recent Trends in Information Computer Science, 2009, pp 1 - 4.
Systems (ReTIS), 2011 International Conference on , vol., no., [18] Cheng Hung Chuang, Guo Shiang Lin, “Data steganography for
pp.214,217, 21-23 Dec. 2011. optical color image cryptosystems”, International Journal of Image
[11] Madhusudan Joshi, Chandrashakhar, Kehar Singh, “Color image Processing (IJIP), Vol 3 Issue 6, pp 318 – 327, January 2010.
encryption and decryption using fractional fourier transform”, [19] Haldun M. Ozaktas, M. Alper Kutay, Zeev Zalevsky, The
Optics communications, Vol. 279 Issue 1, pp 35-42, 1 November fractional Fourier transform: with applications in optics and signal
2007. processing, New York, John Wiley & Sons, 2001.
[12] Narendra Singh, Alok Sinha, “Optical image encryption using [20] I.A. Ismail , Mohammed Amin and Hossam Diab, “An Efficient
fractional fourier transform and chaos”, Optics and Lasers in Image Encryption Scheme Based Chaotic Logistic Maps”,
Engineering”, Vol. 46 Issue 2, pp 117 – 123, February 2008. International Journal of Soft Computing, Vol. 2, pp 285-291, 2007.
[13] Lin Zhang, Jianhua Wu, Nanrun Zhou, “Image Encryption with [21] Alexander D. Poularikas, “Transforms And Applications
Discrete Fractional Cosine Transform and Chaos”, Fifth Handbook”, 3rd ed., New York, CRC Press, 1996.
International Conference on Information Assurance and Security [22] A. C. McBRIDE and F. H. KERR, " On Namias's Fractional
2009 IAS '09, pp 61 – 64, 2009. Fourier Transforms “, IMA Journal of Applied Mathematics,
[14] Ran Tao, Yi Xin, Yue Wang, “Double image encryption based on Volume 39, Issue 2, pp. 159-175, 1987.
random phase encoding in the fractional fourier domain”, Optics [23] C. Gasquet and P. Witomski, “Chap. XII”, Analyse de Fourier et
Express, Vol. 15 Issue 24, pp 16067- 16079, 2007. Applications, Masson, Paris 1990.
[15] Madhusudan Joshi, Chandra Shakhar, Kehar Singh, “Image [24] Y. Sheng, D. Roberge, and H. Szu, “Optical wavelet transform”,
encryption using chaos and radial Hilbert transform”, ICOP - Optical Engineering, Vol. 31 Issue 9, 1992, pp 1840–1845.
International Conference on Optics and Photonics, November
2009.
www.ijcsit.com 688