You are on page 1of 7

Image Steganography Using Mid Position Value

Technique
Mukherjee
Roy Sanyal
Computer Science & Engineering
Computer Science & Engineering Computer Science & Engineering
Department
Department Department
National Institute of Technology
National Institute of Technology National Institute of Technology
Durgapur
Durgapur Durgapur
Durgapur, India
Durgapur, India Durgapur, India
srilekha.mukherjee3@gmail.com
sroy@eng.ua.edu gsanyal@cse.nitdgp.ac.in
Abstract— This paper presents a steganographic approach of value differencing is proposed by Chang et al. [8]. This new
concealing the secret data so as to facilitate secure methodology performed better in terms of payload [9] and
communication. Arnold transformation has been imposed on PSNR computations. Gray Level Modification (GLM) [10],
the chosen cover image in the first stage. This results in the proposed by Potder et al. is another technique which maps
scrambling of the data bits, thereby disrupting the normal data by remodeling the gray level values of the pixels
pixel orientation. Thereafter, Mid Position Value (MPV) residing in the image. Specifically the gray level values of
technique is implemented to embed data bits from the secret selected pixels are compared with the secret data bits. Some
image within the scrambled cover. Lastly, inverse Arnold techniques of combining the PVD and GLM methods with
transformation is applied on the above image. This results in a the aim of increasing the payload have also been proposed.
descrambling operation, i.e. reverting back the normal
One such approach is put forward by Safarpour et al. [11].
orientation. Henceforth the stego is generated. All the
experimental results analyze the outcome of the full
Another effective approach is proposed by Ahmad T et al.
methodology. For this purpose, several quantitative and [12]. Here, the cover at first is split into some blocks. Later
qualitative benchmark analysis pertaining to this approach based on certain conditions, data bits are masked in the block
have been made. All the results show that the imperceptibility, edges.
i.e. non- detectability of secret data is well maintained. Also
the payload is high with negligible distortion in the image III. PROPSED WORK AND ALGORITHMS
quality.
This section encircles the proposed approach in image
medium. All the steps of embedding and extraction are
Keywords—steganography, mid position value (MPV), peak shown in Fig. 1 (a) and (b) respectively. In the sender side,
signal to noise ratio (PSNR), similarity measure. the cover image is first scrambled by applying Arnold
Transformation over it. A chaotic representation of the
I. INTRODUCTION (HEADING 1) cover is the resultant output. This scrambled representation
Security issue is a rising alarm around this modern serves as a layer of security since the original pixel positions
developing globe. In this context cryptography [1] was are scuffled before embedding. Bits from the secret image
developed as an encryption [2] technique to secure the are then inserted in the above transformed image. For this,
contents of the confidential information. But often this is not we incorporate the proposed Mid Position Value (MPV)
sufficient and it becomes necessary to keep the very technique. This methodology uses the concept of the middle
existence hidden. The purpose of steganography [3] is position and its respective values for each of the residing
actually fencing the specified concern. In this paper we have pixels. Further, resting on the specified ground, the key
proposed a technique to sustain the steganographic target. A values are computed. Finally, private data bits are embedded
scrambling transformation has been used on the cover image following a certain fashion on insertion (given in Table 1).
in the beginning. This is done with the incorporation of the Inverse Arnold Transformation gives back the actual stego-
Arnold Transform [4] on the cover or host. A randomized image. In the receiving side, all the steps are executed in
distribution of the image pixels is generated, which serves as correct sequence so as to retrieve the masked image.
a carrier for the confidential data bits. The proposed Mid The flow diagrams of the processes are shown next in fig. 1.
Position Value (MPV) methodology facilitates the insertion
mechanism of the data bits. MPV technique speculates on the
concept of the middle position and its respective integer
values of all the dwelling pixels. This concept is used to
generate the keys, which guide the insertion pattern. With the
execution of the MPV procedure, pixel data bits get
embedded in the shuffled form of cover. Lastly, application
of inverse Arnold transform gives the required stego-image
[5].
This paper is subdivided into several sections. Section 2
contains a brief discussion of some of the related works.
Section 3 discloses the main proposed approach with all the
necessary algorithms. Section 4 comprises of the
experimental results and discussion. Section 5 infers the
conclusion along with the future work.

II. RELATED WORKS


Data hiding by LSB [6] is one of the most simple and
traditional methods. This approach works by hiding data in
the least significant bits (LSB) of the pixels. Significant
though it is but still some changes in the image may impair
the embedded data. The method of Pixel Value Differencing
(PVD) [7], proposed by Wu and Tsai is another effective
steganographic approach. It forms pixel blocks from the
cover and alters the pixel difference in each pair of blocks for
data insertion. Greater the difference more is the alteration
made. Based on PVD, another method of tri way of pixel
(a)
f) Obtain key1 from eqn. 3
Fig. 1. (a) The process in the Sender’s side (Embedding). (b) The process in the Receiver’s side (Extraction).
key1=p(i,j)mid_value (3)
g) If key1 exceeds the total no of pixels (say ‘T’), then
A) Embedding
This stage efficiently masks the confidential data within a key1=key1%T (4)
seemingly unimportant chosen cover or host. h) Obtain a decimal (say ‘4_bit_dec’) with the
 Input a cover last_4_bits of the pixel value at p(i,j) (i.e.
 Apply Arnold Transform on it ‘pix(key)’)
 Implement Mid Position Value (MPV) i) Perform
technique to embed data
 Incorporate inverse Arnold Transform to key2=key1%(4_bit_dec_pix(key))+1 (5)
generate the Stego j) Insertion takes place in p(i,j) according to Table 1
Mid Position Value (MPV) technique (Sender) TABLE 1. CONDITIONAL TABLE OF
INSERTION/EXTRACTION STRATEGIES.
a) Take an input image (say ‘img1’)
Estimated key1 Estimated Insertion/Extraction
b) Trace the pixel positions (say ‘p(i,j)’) of ‘img1’ key2 Technique
using eqn. 1
Even Even Direct
p(i,j)=(i-1)*m+j (1) (key1%2=0) (key2%2=0) embedding/extraction
c) For each ‘p(i,j)’, estimate the number of digits (say of two bit secret data
‘total_digits’) in it Odd (key2%2! Reverse
d) Calculate the middle digit position (say =0) embedding/extraction
‘mid_position’) by the following eqn. 2 of two bit secret
mid _ position= (total _ digits / 2) +1 (2) Odd (key1%2! Even Direct two bit
=0) (key2%2=0) complementary
e) Capture the residing integer value (say embedding/extraction
‘mid_value’) in ‘mid_position’ of ‘p(i,j)’
Odd (key2%2! Reverse two bit
=0) complementary
embedding/extraction

B) Extraction
This stage extracts the masked data bits from the stego so as
to retrieve the hidden image

 Input the stego-image


 Apply Arnold Transformation on it
 Implement Mid Position Value (MPV)
receiving technique to extract data bits
 Finally, the secret image is retrieved

Mid Position Value (MPV) receiving technique

a) Take a stego image (say ‘img2’)


b) Repeat steps ‘b’ to ‘i’ from Mid Position Value
(MPV) technique (Sender)
c) Extraction of bits takes place in p(i,j) according to
Table 1
d) All the extracted data bits fill up individual eight
bit pixel arrays, generating the inserted secret
image

IV. EXPERIMENTAL RESULTS AND DISCUSSION

(b)
Cover Image Scrambled Cover Secret Intermediate Stego Stego Image
Image Image Image

Fig. 2. The sequential process of the Embedding Phase


The above Table displays the PSNR values obtained for
various methods with respect to various images. The MPV
A) Embedding capacity methodology gives moderate PSNR values which signify
Embedding capacity (may also be referred to as payload) that the imperceptibility is maintained. For some cases the
[13] is the maximum limit up to which data can be method proposed by Ahmad T et al. gives better PSNR
embedded within the carrier with no significant distortion. results than MPV approach. But in most-
of the cases, MPV outperforms the others.
TABLE 2. COMPARISON OF EMBEDDING CAPACITY
C) Similarity Measure
Image Image PVD GLM Ahmed Safarpour MPV The function used for estimating the similarity measure
size T et al. et al. [16] is computed in eqn. 8, where ‘ci’ is the cover pixels,
Lena 128x128 ** 2048 2493 3906 4096 ‘si’ is the stego pixel, c and s are the mean values of the
256x256 ** 8192 10007 15500 16384 cover and stego respectively.
512x512 50960 32768 40017 58861 65536
Pepper 128x128 ** 2048 2443 3906 4096
256x256 ** 8192 9767 15500 16384
512x512 50685 32768 39034 58861 65536

(** For PVD method, all the images that were used, are of size 512x512)
Table 2 portrays the comparative study of payload or embedding capacity.
Out of all the methods compared, the MPV approach has the maximum
capacity due to its 2 bit insertion strategy. Therefore, this serves to be an
advantage in the field of steganography. Shown next in Figs. 3, 4 and 5 are the comparison of
similarity measure for various methods with respect to
B) MSE and PSNR different images
Mean squared error, i.e. MSE [14] can be calculated
from the eqn. 6, where C is the cover (consisting MxN
pixels)
and S is its generated stego.

(6)

Peak Signal to Noise Ratio (PSNR) [15] is estimated from


the obtained MSE values in accordance with eqn. 7.

(7)

TABLE 3. COMPARISON OF PSNR VAUES Fig. 3. Comparison of Similarity Measure w.r.t Lena Image.

Image Image PVD GLM Ahmed Safarpour MPV


size T et al. et al.
Lena 128x128 36.20 30.50 44.30 41.02 44.55
256x256 35.00 33.20 46.80 40.80 44.67
512x512 41.79 35.50 55.00 40.05 44.88
Peppe 128x128 38.70 38.00 43.50 40.96 44.97
r 256x256 35.00 37.20 47.50 38.97 45.66
512x512 40.97 34.00 52.50 39.12 45.84
[1] Y. J. I. J. o. I. Yamaguchi and C. Technology, "Extended visual
cryptography for continuous–tone images: effect of the optimum tone
mapping," vol. 7, no. 1, pp. 25-39, 2015.
[2] J. Vreugdenhil, K. Iverson, and R. S. Katti, "Image encyption using
dynamic shuffling and XORing processes," in 2009 IEEE
International Symposium on Circuits and Systems, 2009, pp. 734-737:
IEEE.
[3] K. D. Nagpal, D. J. I. J. o. R. Dabhade, I. T. i. Computing, and
Communication, "A Survey on Image Steganography & its
Techniques in Spatial & Frequency Domain," vol. 3, no. 2, pp. 776-
779, 2015.
[4] M. A. Elayan and M. O. Ahmad, "Digital watermarking scheme based
on Arnold and anti-Arnold transforms," in International Conference
on Image and Signal Processing, 2016, pp. 317-327: Springer.
[5] S. Mukherjee, S. Ash, and G. Sanyal, "A novel image steganographic
Fig. 4. Comparison of Similarity Measure w.r.t. Baboon methodology by Power Modulus Scrambling (PMS) with logistic
Image. mapping," in TENCON 2015-2015 IEEE Region 10 Conference,
2015, pp. 1-6: IEEE.
[6] R. Joshi, L. Gagnani, S. J. I. J. o. A. R. i. C. E. Pandey, and
Technology, "Image steganography with LSB," vol. 2, no. 1, pp. 228-
229, 2013.
[7] Sanchetti, A. (2012) “Pixel Value Differencing Image Steganography
Using Secret Key” International Journal of Innovative Technology
and Exploring Engineering. 2.
[8] K.-C. Chang, C.-P. Chang, P. S. Huang, and T.-M. J. J. o. m. Tu, "A
Novel Image Steganographic Method Using Tri-way Pixel-Value
Differencing," vol. 3, no. 2, 2008.
[9] T.-H. Lan, M. F. Mansour, and A. H. Tewfik, "Robust high capacity
data embedding," in Proceedings 2000 International Conference on
Image Processing (Cat. No. 00CH37101), 2000, vol. 1, pp. 581-584:
IEEE.
[10] V. M. Potdar and E. Chang, "Grey level modification steganography
for secret communication," in 2nd IEEE International Conference on
Industrial Informatics, 2004. INDIN'04. 2004, 2004, pp. 223-228:
Fig. 5. Comparison of Similarity Measure w.r.t. Pepper IEEE.
Image. [11] M. Safarpour and M. J. a. p. a. Charmi, "Capacity enlargement of the
PVD steganography method using the GLM technique," 2016.
[12] A. T. Al-Taani, A. M. J. I. J. o. C. Al-Issa, Information,, Systems
From the above figures, we can clearly see that for Science, and Engineering, "A novel steganographic method for gray-
all the cases, the values obtained from the MPV technique level images," vol. 3, no. 1, 2009.
lies very close to 1, as compared to all others. This proves [13] H. R. Kanan and B. J. E. s. w. a. Nazeri, "A novel image
that the quality of the image is well maintained, i.e. the steganography scheme with high embedding capacity and tunable
cover images and their stegos are highly similar. visual image quality based on a genetic algorithm," vol. 41, no. 14,
pp. 6123-6130, 2014.
[14] S. Mukherjee, G. J. I. J. o. C. Sanyal, and Applications, "Enhanced
position power first mapping (PPFM) based image steganography,"
V. CONCLUSION AND FUTURE WORK vol. 39, no. 2, pp. 59-68, 2017.
Steganography facilitates security for several [15] A. Almohammad and G. Ghinea, "Stego image quality and the
legitimate purposes during communication [17]. In this reliability of PSNR," in 2010 2nd International Conference on Image
Processing Theory, Tools and Applications, 2010, pp. 215-220: IEEE.
paper, we have proposed a steganographic approach in
[16] S. Ash, S. Mukherjee, and G. Sanyal, "A dwt based steganographic
image medium which masks the secret data bits that we method using prime first mapping (pfm)," in 2015 Second
want to communicate without any third party intervention. International Conference on Advances in Computing and
Application of Arnold Transform on the host image layers a Communication Engineering, 2015, pp. 471-476: IEEE.
level of security in the beginning of the procedure itself. The [17] M. Yuksel, X. Liu, E. J. I. T. o. I. F. Erkip, and Security, "A secure
communication game with a relay helping the eavesdropper," vol. 6,
MPV technique follows a conditional strategy while no. 3, pp. 818-830, 2011.
embedding of secret data bits. Thus, the overall security [18] S. Mukherjee, S. Ash, and G. Sanyal, "A novel image steganographic
[18] is endorsed. This methodology promotes high approach by Pixel Position Modulus Method (PPMM)," in 2015 2nd
embedding capacity of the carrier image [19]. The International Conference on Computing for Sustainable Global
experimental results affirm that the generated stego is highly Development (INDIACom), 2015, pp. 278-283: IEEE.
imperceptible [20]. Therefore, it does not attract the [19] A. K. Singh et al., "Guest editorial: robust and secure data hiding
techniques for telemedicine applications," vol. 76, no. 5, pp. 7563-
attention of unwanted sources. In future, this work can be 7573, 2017.
extended to accommodate more secret data bits [21] within [20] S. Mukherjee and G. Sanyal, "A novel image steganographic
the carrier medium. Alongside, there must be no chances of technique using position power first mapping (PPFM)," in 2015 IEEE
introducing any kind of distortion [22] within the generated International Conference on Research in Computational Intelligence
and Communication Networks (ICRCICN), 2015, pp. 406-410: IEEE.
stego.
[21] S. H. Soleymani, A. H. J. M. T. Taherinia, and Applications, "High
REFERENCES capacity image steganography on sparse message of scanned
document image (SMSDI)," vol. 76, no. 20, pp. 20847-20867, 2017.
[22] J. Vreugdenhil, K. Iverson, and R. S. Katti, "Image encyption using
dynamic shuffling and XORing processes," in 2009 IEEE
International Symposium on Circuits and Systems, 2009, pp. 734-
737: IEEE.

You might also like