Professional Documents
Culture Documents
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on March 10,2021 at 04:48:43 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)
the steganography using a hash function. His LSB insertion The following steps are the process of incorporating
process has a 63 dB PSNR and a 0.03 MSE. secret text in the cover image-
J. Baek et al [4] introduced a secret sharing method of Step 1: Read RGB cover image.
information using gray-scale image steganography. XOR was Step 2: Read the text file and apply the crypto algorithm to
used to perform a bit display on a specific pixel bit. secret text using rail fence encryption technique to get cipher
text and convert in to a 1-Dimensional array of bits.
Mandal, J.K., Sengupta M, [5] Proposed minimum Step 3: Convert RGB to YCbCr color space model using
variance of the data integration technique based on fidelity. equations 1, 2&3 respectively
In this case, random replacement positions are chosen to Step 4: Separate Cr component from YCbCr color image.
modify two bits by the byte between LSB and until the fourth Step 5: Convert Cr component pixels in to 8 bit binary
bit towards MSB.
values.
Deepak kumar [6] implemented a hiding text in color Step 6: For every pixel
image using YCbCr color model with better PSNR and low a. Find the first and second bit of secret message.
MSE values for different images. Renuka, Hemalatha S, U b. Execute XOR with the first bit of secret message, 8th
Dinesh Acharya, A [7] Proposed a pixel value difference in
LSB on image steganography with One Time Pad bit of pixel and XOR with the second bit of secret
Encryption technique. message, 7th bit of pixel.
c. Place the resultant bit in the current pixel at 2nd and
III. PROPOSED WORK
1st LSB
The proposed method is combination of 2-bit XOR d. Repeat step (b) until the message is completed for ea
[8] LSB replacement in Cr, crypto-algorithm and YCbCr ch pixel.
Color Model.
Step 7: Recombine Cr component with YCb color space into
A. Crypto algorithm : Rail fence cipher a single image YCbCr.
The Rail Fence Cipher is a very simple, easy to crack Step 8: Convert YCbCr to RGB stego-Image.
cipher. It is a transposition cipher which follows a simple
rule to mix the characters into the plaintext to form the text of D. Extraction Algorithm:
the cipher. The method of extracting hidden text from stego-images is as
For example, let’s consider follows:
the plaintext “MADHUISINMIT” with key: 2. Arrange the Step 1: Read RGB stego-Image.
plaintext into rail fence cipher model as shown in figure 2. Step 2: Convert RGB image to YCbCr image and Separate
Cr component.
Step 3: Convert Cr component pixels in to 8 bit binary
values.
Fig.2. Rail fence cipher Step 4: For every pixel
Using a rail-fence cipher algorithm with key 2 the cipher a. Find a first and second bit of secret message and
text becomes:" MDUSNIAHIIMT”. The plain-text is written 8th, 7th bit of pixel.
downwards and diagonally on rails of an imaginary fence. b. Execute XOR with the second bit of secret message,
Once we arrive at the bottom rail, the direction is changed 8th bit of pixel and XOR with the first bit of secret
again after reaching the top rail. So, the message is message, 7th bit of pixel.
pronounced in a zig-zag way. Step 5: The XOR resultant bits are cipher text bits and these
B. YCbCr Model bits converted to characters.
The color images are displayed in different color spaces Step 6: Convert Cipher text to recovered plaintext using a
like RGB (Red Green Blue), HSV (Hue, Saturation, and rail fence decryption algorithm.
Value), YUV, YIQ, YCbCr (Luminance, Chromancy), etc.
YCbCr Model is defined in the ITU-R BT.709-5 and ITU-R E. Example:
BT.601-5 standards of ITU.
'Y ' is a luma component that provides the information on Consider a simple 2 * 2 image consists of 4-pixels as
brightness and 'Cb' and 'Cr' are the color information shown in figure 3,
components for the blue and red difference. The human eye
is highly sensitive to luminance changes but not
chrominance. Thus small chrominance changes can not affect
the overall quality of the image. YCbCr [9], [10] is A(98,109,131) B(88,120,144)
sometimes abbreviated to YCC. Y′CbCr is often
called YPbPr . C(84,129,131) D(72,136,128)
C. Embedding Algorithm:
Input:–RGB Image and Secret Data and Secret Key Fig.3. Example Image to cover the data
Output: Stego -Image.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on March 10,2021 at 04:48:43 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on March 10,2021 at 04:48:43 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)
(a)
(b)
Fig.5. Histogram analysis of Cr component
(c)
(d)
(e)
Fig.4. Output Images of Baboon and Peppers:(a)YCbCr Image,(b)Cr
component,(c)Cr component with Data,(d)YCbCr image,(e)Stego-Image.
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on March 10,2021 at 04:48:43 UTC from IEEE Xplore. Restrictions apply.
2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)
Authorized licensed use limited to: ANNA UNIVERSITY. Downloaded on March 10,2021 at 04:48:43 UTC from IEEE Xplore. Restrictions apply.