Professional Documents
Culture Documents
Technique
Mukherjee
Roy Sanyal
Computer Science & Engineering
Computer Science & Engineering Computer Science & Engineering
Department
Department Department
National Institute of Technology
National Institute of Technology National Institute of Technology
Durgapur
Durgapur Durgapur
Durgapur, India
Durgapur, India Durgapur, India
srilekha.mukherjee3@gmail.com
sroy@eng.ua.edu gsanyal@cse.nitdgp.ac.in
Abstract— This paper presents a steganographic approach of value differencing is proposed by Chang et al. [8]. This new
concealing the secret data so as to facilitate secure methodology performed better in terms of payload [9] and
communication. Arnold transformation has been imposed on PSNR computations. Gray Level Modification (GLM) [10],
the chosen cover image in the first stage. This results in the proposed by Potder et al. is another technique which maps
scrambling of the data bits, thereby disrupting the normal data by remodeling the gray level values of the pixels
pixel orientation. Thereafter, Mid Position Value (MPV) residing in the image. Specifically the gray level values of
technique is implemented to embed data bits from the secret selected pixels are compared with the secret data bits. Some
image within the scrambled cover. Lastly, inverse Arnold techniques of combining the PVD and GLM methods with
transformation is applied on the above image. This results in a the aim of increasing the payload have also been proposed.
descrambling operation, i.e. reverting back the normal
One such approach is put forward by Safarpour et al. [11].
orientation. Henceforth the stego is generated. All the
experimental results analyze the outcome of the full
Another effective approach is proposed by Ahmad T et al.
methodology. For this purpose, several quantitative and [12]. Here, the cover at first is split into some blocks. Later
qualitative benchmark analysis pertaining to this approach based on certain conditions, data bits are masked in the block
have been made. All the results show that the imperceptibility, edges.
i.e. non- detectability of secret data is well maintained. Also
the payload is high with negligible distortion in the image III. PROPSED WORK AND ALGORITHMS
quality.
This section encircles the proposed approach in image
medium. All the steps of embedding and extraction are
Keywords—steganography, mid position value (MPV), peak shown in Fig. 1 (a) and (b) respectively. In the sender side,
signal to noise ratio (PSNR), similarity measure. the cover image is first scrambled by applying Arnold
Transformation over it. A chaotic representation of the
I. INTRODUCTION (HEADING 1) cover is the resultant output. This scrambled representation
Security issue is a rising alarm around this modern serves as a layer of security since the original pixel positions
developing globe. In this context cryptography [1] was are scuffled before embedding. Bits from the secret image
developed as an encryption [2] technique to secure the are then inserted in the above transformed image. For this,
contents of the confidential information. But often this is not we incorporate the proposed Mid Position Value (MPV)
sufficient and it becomes necessary to keep the very technique. This methodology uses the concept of the middle
existence hidden. The purpose of steganography [3] is position and its respective values for each of the residing
actually fencing the specified concern. In this paper we have pixels. Further, resting on the specified ground, the key
proposed a technique to sustain the steganographic target. A values are computed. Finally, private data bits are embedded
scrambling transformation has been used on the cover image following a certain fashion on insertion (given in Table 1).
in the beginning. This is done with the incorporation of the Inverse Arnold Transformation gives back the actual stego-
Arnold Transform [4] on the cover or host. A randomized image. In the receiving side, all the steps are executed in
distribution of the image pixels is generated, which serves as correct sequence so as to retrieve the masked image.
a carrier for the confidential data bits. The proposed Mid The flow diagrams of the processes are shown next in fig. 1.
Position Value (MPV) methodology facilitates the insertion
mechanism of the data bits. MPV technique speculates on the
concept of the middle position and its respective integer
values of all the dwelling pixels. This concept is used to
generate the keys, which guide the insertion pattern. With the
execution of the MPV procedure, pixel data bits get
embedded in the shuffled form of cover. Lastly, application
of inverse Arnold transform gives the required stego-image
[5].
This paper is subdivided into several sections. Section 2
contains a brief discussion of some of the related works.
Section 3 discloses the main proposed approach with all the
necessary algorithms. Section 4 comprises of the
experimental results and discussion. Section 5 infers the
conclusion along with the future work.
B) Extraction
This stage extracts the masked data bits from the stego so as
to retrieve the hidden image
(b)
Cover Image Scrambled Cover Secret Intermediate Stego Stego Image
Image Image Image
(** For PVD method, all the images that were used, are of size 512x512)
Table 2 portrays the comparative study of payload or embedding capacity.
Out of all the methods compared, the MPV approach has the maximum
capacity due to its 2 bit insertion strategy. Therefore, this serves to be an
advantage in the field of steganography. Shown next in Figs. 3, 4 and 5 are the comparison of
similarity measure for various methods with respect to
B) MSE and PSNR different images
Mean squared error, i.e. MSE [14] can be calculated
from the eqn. 6, where C is the cover (consisting MxN
pixels)
and S is its generated stego.
(6)
(7)
TABLE 3. COMPARISON OF PSNR VAUES Fig. 3. Comparison of Similarity Measure w.r.t Lena Image.