Professional Documents
Culture Documents
Abstract- We consider an edge detection method to find The following are the criteria of the edge
the edge of the image and then hide our secret message
detection method. The first and most obvious is low
using LSBMR technique. Cover image is cropped and
then rotated, secret message is then embedded in the error rate. It is important that edges occurring in
rotated image. The process is reversed in order to place images should not to be missed and that there be NO
the cropped image in its original position; now the stego responses to non-edges. The second criterion is that
image looks exactly same as the cover image. Thus our the edge points be well localized. In other words, the
work is highly secure. distance between the edge pixels as found by the
detector and the actual edge is to be at a minimum. A
Keywords- Steganography, cover image, stego image, third criterion is to have only one response to a single
LSBMR, Edge detection method. edge. This was implemented because the first 2 were
not substantial enough to completely eliminate the
INTRODUCTION
possibility of multiple responses to an edge.
According to many different methods for
communication now-a-days, and as a result of In Practice, two properties, undetectability
spreading the Internet all around the world, and embedding capacity, should be carefully
motivation of hiding secret message in different considered when designing a Steganographic
multimedia and secure communication via Internet is algorithm. Usually, the larger payload embedded in a
increased. Steganography is one of the most popular cover, the more detectable artifacts would be
ways for secret communication which differs introduced into the stego. In many applications, the
inherently with cryptography. In both methods, secret most important requirement for Steganography is
message is transformed between two groups, undetectability, which means that the stegos should
transmitter and receiver. However, the main purpose be visually and statistically similar to the covers
in cryptography is to make massage concept while keeping the embedding rate as high as possible.
unintelligible. So eavesdroppers could not guess its
concept, while steganography aims to hide secret Unlike LSB replacement and LSBM, which
message and secret communication. In steganography deal with the pixel values independently, LSB
secret message can be hidden in voice, video, text matching revisited (LSBMR) uses a pair of pixels as
and image. an embedding unit, in which the LSB of the first
pixel carries one bit of secret message, and the
Images that are used for inserting and hiding relationship (odd–even combination) of the two pixel
secure data are called ‘cover image’ and the image values carries another bit of secret message. In such a
where secret bits are inserted is called ‘stego image’. way, the modification rate of pixels can decrease
from 0.5 to 0.375 bits/pixel (bpp) in the case of a
Edges characterize boundaries and are maximum embedding rate, meaning fewer changes to
therefore a problem of fundamental importance in the cover image at the same payload compared to
image processing. Edges in images are areas with LSB replacement and LSBM.
strong intensity contrasts – a jump in intensity from
one pixel to the next. Edge detecting an EDGE DETECTOR ALGORITHM
image significantly reduces the amount of data and Based on the above criteria, the canny edge
filters out useless information, while preserving the detector first smoothes the image to eliminate and
important structural properties in an image. noise. It then finds the image gradient to highlight
regions with high spatial derivatives. The algorithm
1
then tracks along these regions and suppresses any (columns) and the other estimating the gradient in the
pixel that is not at the maximum (non maximum y-direction (rows). They are shown below:
suppression). The gradient array is now further
reduced by hysteresis. Hysteresis is used to track The magnitude, or EDGE STRENGTH, of the
along the remaining pixels that have not been gradient is then approximated using the formula:
suppressed. Hysteresis uses two thresholds and if the
magnitude is below the first threshold, it is set to zero |G| = |Gx| + |Gy|
(made a nonedge). If the magnitude is above the high
threshold, it is made an edge. And if the magnitude is
between the 2 thresholds, then it is set to zero unless
there is a path from this pixel to a pixel with a
gradient above T2.
A. Step 1
In order to implement the edge detector
algorithm, a series of steps must be followed. The
first step is to filter out any noise in the original
image before trying to locate and detect any edges. C. Step 3
And because the Gaussian filter can be computed
using a simple mask, it is used exclusively in the Finding the edge direction is trivial once the gradient
algorithm. Once a suitable mask has been calculated, in the x and y directions are known. However, you
the Gaussian smoothing can be performed using will generate an error whenever sum X is equal to
standard convolution methods. A convolution mask is zero. So in the code there has to be a restriction set
usually much smaller than the actual image. As a whenever this takes place. Whenever the gradient in
result, the mask is slid over the image, manipulating a the x direction is equal to zero, the edge direction has
square of pixels at a time. The larger the width of the to be equal to 90 degrees or 0 degrees, depending on
Gaussian mask, the lower is the detector's sensitivity what the value of the gradient in the y-direction is
to noise. The localization error in the detected edges equal to. If GY has a value of zero, the edge direction
also increases slightly as the Gaussian width is will equal 0 degrees. Otherwise the edge direction
increased. The Gaussian mask used in my will equal 90 degrees. The formula for finding the
implementation is shown below edge direction is just:
theta = invtan (Gy / Gx)
D. Step 4
Once the edge direction is known, the next step is to
relate the edge direction to a direction that can be
traced in an image. So if the pixels of a 5x5 image are
aligned as follows:
x x x x x
x x x x x
x x a x x
x x x x x
x x x x x
3
• Step 1: The cover image of size of is first on the secret key , until all the hidden bits are
divided into non overlapping blocks of extracted completely. For each qualified embedding
pixels. For each small block, we rotate it by a random unit, say, , where ,we
degree in the range of as extract the two secret bits as follows:
determined by a secret key . The resulting image
is rearranged as a row vector by raster scanning.
And then the vector is divided into non overlapping
embedding units with every two consecutive pixels
, where assuming is We eventually get the secret bits by
an even number.
EXPERIMENTAL RESULTS
where , is the size of the secret In this section we will show our
message , and denotes the total number of elements experimental results. From the edge its pixel value is
in the set of . Please note that when, the proposed found out and the following process will take place as
method becomes the conventional LSBMR scheme, follows.
which means that our method can achieve the same
Specific cropping position is given
payload capacity as LSBMR (except for 7 bits).
accordingly to the image. Image will get cropped in
B. Data Extraction that position in the size of 200 × 200 pixel. In the
Cropped region, rotate it by a random degree in the
To extract data, we first extract the side range of {0, 90, 180, 270} now after rotation, text
information, i.e., the block size and the threshold will be embedded in a particular pixel value.
from the stego image. We then do exactly the same The following examples will explains how
things as Step 1 in data embedding. The stego image the data is embedded in the image pixel value.
is divided into blocks and the blocks are
then rotated by random degrees based on the secret
key . The resulting image is rearranged as a row
vector . Finally, we get the embedding units by Ex1:
dividing into non overlapping blocks with two
Let the message is welcome
consecutive pixels.
w è ASCII è 119 è binary value è 1110111
We travel the embedding units whose
absolute differences are greater than or equal to the bits 1110111
threshold according to a pseudorandom order based
4
Particular position (50 ,52) è pixel value è 4272668 c. Cropped image
Ex2:
bits 1100011
First bit è 1
e. Stego image
5
b.House(edges=10023) d. Nokia(edges=7790)\ [8] A. D. Ker, “Steganalysis of LSB matching in grayscale
images,” IEEE Signal Process. Lett., vol. 12, no. 6, pp.
441–444, Jun. 2005.
REFERENCES