SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 199
DFT BASED INDIVIDUAL EXTRACTION OF STEGANOGRAPHIC
COMPRESSION OF IMAGES
C. Rengarajaswamy1
1
Assistant Professor, Department of Electronics and Communication Engineering, M.A.M School of Engineering, Trichy,
Tamil Nadu
Abstract
A Novel scheme of Separable Extraction of concealed data and compressed image is proposed adopting a transform based
compression over the encrypted data. Reversible data hiding is branched under Steganography. In this reversible data hiding the art
of concealing a secret data over the cover image is practiced. More than that, the main ingredients that play the key role are
encryption key and the data hiding key, the compression is performed in between the two processes i.e., encryption and data hiding, to
create a spare space to accommodate the secret data. The main aim of this proposed scheme is to limit the distortion and to enhance a
wide space for concealing of the secret data i.e., to increase the embedding rate. The compression here classified into lossy and
lossless. Lossy compression best suits for image and audio (telephone conversation, etc.) whereas lossless compression needed in the
text and videos. Hence to perform the lossless compression over a stegomized image and improve its secrecy, DFT is performed after
Encryption.
Keywords: DFT, Data Embedding, RDH, Separable RDH, Compression
----------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
In the world of communication, security plays a vital role and
owns a major regime on its stack. The word communication
now a day’s does not travel alone, but hand in hand with
security aspects. Thus security turns to be the key to unlock a
communication box. Coming to security, which is branched
into cryptography, information hiding and watermarking etc,
provides better role as they take part. As the technology keeps
on changing its face with advanced features, there is need to
get updated to it in its long run towards the betterment of
future. Usually the happening is that when a new algorithm is
produced or an existing algorithm is revised, intruders or
hackers break the algorithm. So it is a must to develop
algorithms more efficient and be stable and unbreakable to
most extent. Normally, the network security is branched into
cryptography and information hiding. Information hiding
contains Steganography and watermarking which may be
dated back old compared to cryptography. In cryptography,
scramble of data’s takes place at the transmitter and
unscrambling them gives the exact input at the receiver
section. Thus for scrambling and unscrambling denoted
technically as encryption and decryption, a key is used. Thus
to encrypt and decrypt same key or different keys may be
used. Further extending its branches into symmetric
(conventional) and asymmetric (public key) encryption. Here
in the former encryption, same key is used both at the
transmitter and receiver. Bit in the later case, different key is
handled. Coming to Steganography, which is art of concealing
of data into other. It may be dated past, but again heads to
more secure transmission. In order to improve the security
level, combination of various techniques is handled. One such
try is the Steganography over cryptography. Thus both the
techniques provide better authentication and integrity among
the users. One such technique chosen under Steganography is
RDH (Reversible Data Hiding). In RDH, major ingredients are
the cover data and the secret data. Cover data is which the
secret data to be hidden, like the letter enclosed in an
envelope. The other is secret or additional data. Here the
overall data enclosing the cover data and secret data is called
the marked cover. In RDH more importance is given to the
cover data, such that the user information is inscribed over it.
There is a lot application employing RDH mainly in the case
of military communication, patient details, in case of
emergency over country, etc. The below diagram illustrates
the basic block of how RDH is processed through. Thus
embedding secret data to the cover data at transmitter and the
reverse process explains abut extracting the secret data as well
as the cover data without any error, if error data not recovered.
The later part of this paper is lapsed as follows. Section II
comprises related works describing RDH and its separable
extension. Section III describes the proposed work handling
stream cipher encryption and DFT compression and
embedding. Section IV gives us the exact view of the
proposed scheme as the experimental results using Image
Processing Tool. Section V summarizes the whole content to a
short and sweet manner. Further, in section VI the references
are listed.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 200
Fig 1 Basic Block diagram of RDH
2. RELATED WORKS
2.1 Embedding in LSB
A digital image is basically divided into pixels. These pixel
values may vary for each type of images. For a Binary image,
the pixel value is 1, for gray scale and color the range of pixel
is 8-bit and 24-bit. So to carry the LSB embedding process,
mostly gray scale and color images are preferred. Here in LSB
only the least bits of a pixel is altered or cleared to embed the
secret or additional data. If any change is made in the MSB
bits, they change the whole nature of the Image. Here the
Payload Data (secret Data) is embedded in such a way that can
be reconstructed only at the receiving end. The common
procedure that is carried out to embed a payload data is given
by the formula [1],
Si = Ci + Ci mod 2k
+ mi
Here Si - stego image, Ci - the cover image, k - the embedding
parameter and mi - the payload.
Thus LSB is the most basic method and used in common for
creating the sparse space. Thus the sparse space created is
useful for hiding the additional payload data. This makes the
work easier. Hence at the extraction part it is easier to retrieve
the original message as well as the secret data with low data
loss.
2.2 Reversible Data Hiding
Reversible data hiding (RDH) is a technique which is entirely
different from other substitution techniques. In RDH, the main
aim is to recover the data without any error. If there is any
error either in the cover data or the secret explained as
follows. The above diagram shows us how the process is
successfully carried out using RDH. The RDH consists of two
steps each carried at the transmitter and the receiver end. At
the transmitter side the data is embedded into the cover image
in the sparse space already created to hide data. Here the
additional data hidden in done using the data-hiding key, so
that the same key is used at the receiver to recover the secret
data. As soon as the compression and embedding process the
data is passed to the receiving end along with the data-hiding
key. In the receiver end, the extraction process is carried out
using the same data-hiding key.
During this process if any change is done in the transmitted
data, it causes some error in the transmitted data. Thus if any
error occurs either in the cover image r the secret data, the
original data cannot be retrieved. This is the special property
of using RDH which provides additional authentication and
integrity.
2.3 RDH over Encrypted Images
In this section, RDH is performed over an encrypted Image.
Thus it carries three steps and two keys which is same for both
the transmitter and the receiver. The first is encryption using
encryption key and sparse space creation and third is the data
embedding using data-hiding key. The receiver is done in an
orderly process i.e., decryption using the encryption key to
recover the cover image and then applying the data-hiding key
to recover the secret data. If any key is applied without the
specified manner the cover image and the secret data cannot
be recovered, which is a unique property of RDH [2].
2.4 Separable RDH over Encrypted Images
In the earlier method proposed [2], at the receiver end
decryption is performed first in order to extract the cover
image and then applying the data-hiding key to recover the
secret data, which is non-separable in manner. In the case of
separable RDH, either of the key can be used irrespective of
the other to recover the respective data’s independently [3]
Insecure
Channel
Cover
Image
Secret
Image
Embedding
process
Marked
Cover
Transmitter
Marked
Cover
Extraction
process
Cover
Image
Secret
Image
Receiver
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 201
was proposed. This proves to be better flexible among the user
handling different keys.
Fig 2 Proposed RDH using DFT
3. PROPOSED SCHEME
3.1 Encryption Using Stream Cipher
In the encryption part, it is a must to choose what type of
encryption is adopted and which is best suitable. Stream
cipher encryption is chosen despite its high security and
flexibility. In stream cipher, the encryption in carried as bit by
bit format, whereas in the block cipher, an entire block is
subjected to encryption. In stream cipher, a raw data is XOR-
ed with the randomly generated key by the pseudorandom
generator. The pseudo random generated key is used both at
the transmitter and the receiver. Thus the same key is used to
decrypt the data at the receiver end, hence the name symmetric
key encryption.
Di,j,u = di,j,u ki,j,u
Here i,j represents the row and column of the image and u
represents the face value of each bit in the pixel. In this
encryption, each bit of the pixel is XOR-ed with the key
generated by the pseudorandom generator. As the encryption
key is pseudo randomly generated and reproduced only at the
receiving end, which cannot be produced by any intruders and
is difficult to break or analyze the image. A basic algorithm
for stream cipher is RC4 provides better security. Thus each
and every bit in the data is encrypted and is highly secured.
3.2 Compression using DFT and Data Embedding
Compression is a technique for reducing the file size making it
suitable for data transmission. There are two types of
compression, namely lossless and lossy. Image in its 2-D form
can be compressed using various techniques. One primary
method is to use Discrete Fourier transform (DFT). DFT gives
the better approximation of Fourier transform on discrete set
of frequencies. The spatial values in such 2-dimension is
represented as f(x,y). The transformed image is represented as
F(u,v).
𝐹 𝑢, 𝑣 =
1
𝑀. 𝑁
𝑓(𝑥, 𝑦)𝑒−𝑗2𝜋 (
𝑢𝑥
𝑀
+
𝑣𝑦
𝑁
)
𝑁−1
𝑦=0
𝑀−1
𝑥=0
The inverse Fourier transform is thus given by,
𝑓 𝑥, 𝑦 =
1
𝑀. 𝑁
𝐹(𝑢, 𝑣)𝑒 𝑗2𝜋 (
𝑢𝑥
𝑀
+
𝑣𝑦
𝑁
)
𝑁−1
𝑣=0
𝑀−1
𝑢=0
Stream Cipher
Encryption
DFT
Compression
Information
Hiding
Encryption
Key
Cover Image
Secret
Image
Stego Image
Compressed Image
Data Extraction
DFT
Decompression
Decryption
Original Cover Image
Encryption
Key
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 202
Fig 3 Separable Receiver Section
The transform equation suggests that an image of size MxN
with spatial values (x,y) is transformed into one with values
(u,v) [4].
Fast Fourier Transform (FFT) is the fastest method of DFT.
FFT is a high speed and efficient technique. At the
reconstruction stage, the image compressed using lossless
method will have better image quality than the one that is
compressed using lossy method [5].
3.3 Decryption and Extraction
In the receiver side, the reverse process is carried out [3]. Here
as the data is received they can be separately extracted
independently using either the encryption key which is pseudo
randomly generated to extract the decrypted image. Here the
same pseudo random generated must be provided by the
receiver in order to extract the cover image. Then the data-
hiding key is applied to the recovered image to extract the
secret data. The keys can be used alternatively to recover any
one of the data also. Hence offer better flexibility.
4. EXPERIMENTAL RESULTS
(a) Original Cover Image
(b) Stream Ciphered Image
(c) Secret Image
Case 1
Data Extraction
Encrypted image
containing
embedded data
Data Hiding Key
Additional Data
Case 2
Image Decryption
Encrypted image
containing
embedded data
Encryption Key
Decrypted Image
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 203
(d) Stego Image Containing Secret Image
(e) Extracted Secret Image
Fig. 4 Implemented Outputs
The figure above shows the results of the proposed system.
Initially, an image taken is considered to be a cover image.
This image is now given for DFT compression after which the
secret image is embedded into the cover. The obtained stego
image is then given into a separable receiver for separable
extraction of original image and the secret image.
CONCLUSIONS
In this paper we briefly discuss about how to encrypt a data,
compress the encrypted data and embed a data to the
compressed one. The later part explains about the extraction
and decryption. To summarize all this, at the transmitter side
an encryption is carried using the encryption. Then the DFT
compression is done to the encrypted image to create the space
needed to hide the secret image. In the free space provided the
additional secret data is embedded using the data-hiding key.
DFT thus provides efficient compression in the frequency
domain basis. Then at the receiver side, either of the key is
used independently to recover the cover image and the secret
data separately. Among more other compression techniques
DFT operates well in the frequency domain which is best
suited for audio and images. Hereby concluding that DFT
provided best compression rate and loss is a least part
considering.
REFERENCES
[1]. C. K. Chan and L. M. Cheng, “Hiding data in images by
simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp.
469–474, 2004.
[2]. Manikandan R Asst. Professor, Uma M ,
MahalakshmiPreethi S M, “Reversible Data Hiding for
Encrypted Image”, Journal of Computer Applications ISSN:
0974 – 1925,Volume-5, Issue EICA2012-1, February 10, 2012
[3]. X. Zhang, “Reversible data hiding in encrypted image,”
IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr.
2011.
[4]. Inderjit Singh, Sunil Khullar, Dr. S.C. Laroiya, “DFT
Based Image Enhancement and Steganography”, International
Journal of Computer Science and Communication
Engineering, ISSN : 2319-7080, Vol2, Issue 1, Feb 2013.
[5]. Mridul Kumar Mathur, Gunjan Mathur, “ Image
Compression using DFT through Fast Fourier Transform
Technique”, International Journal of Emerging Trends and
Technology in Computer Science”, ISSN : 2278-6856, Vol 1,
Issue 2, July-Aug 2012.

More Related Content

PDF
A Hybrid Approach for Ensuring Security in Data Communication
PDF
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
PPTX
Reversible data hiding in encrypted images by reserving room before encryption
PDF
RSA Based Secured Image Steganography Using DWT Approach
PDF
Ijcnc050208
PDF
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
PDF
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
PDF
Reversible Data Hiding in Encrypted Image: A Review
A Hybrid Approach for Ensuring Security in Data Communication
Reversible Data Hiding In Encrypted Images And Its Application To Secure Miss...
Reversible data hiding in encrypted images by reserving room before encryption
RSA Based Secured Image Steganography Using DWT Approach
Ijcnc050208
A Survey on Privacy-Preserving Data Aggregation Without Secure Channel
IRJET- High Capacity Reversible Data Hiding in Encrypted Images by MSB Predic...
Reversible Data Hiding in Encrypted Image: A Review

What's hot (20)

PDF
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
PPTX
Reversible data hiding using histogram shifting method
PDF
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
PDF
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
PDF
A Survey on Different Data Hiding Techniques in Encrypted Images
DOCX
Lossless and reversible data hiding in encrypted images with public key crypt...
PDF
Research Inventy : International Journal of Engineering and Science
DOCX
Secure reversible image data hiding over encrypted domain via key modulation
PDF
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
PDF
Lossless and reversible data hiding in encrypted images with public key crypt...
PDF
An ideal steganographic scheme in networks using twisted payload
DOCX
Reversible data hiding in encrypted images by reserving room before encryption
PDF
An ideal steganographic scheme in networks using
PDF
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
PDF
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
PDF
Iaetsd design of image steganography using haar dwt
PDF
A secure image steganography based on burrows wheeler transform and dynamic b...
PPTX
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
PDF
H43064650
Secured Reversible Data Hiding In Encrypted Images Using Hyper Chaos
Reversible data hiding using histogram shifting method
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IRJET - A Secure AMR Stganography Scheme based on Pulse Distribution Mode...
A Survey on Different Data Hiding Techniques in Encrypted Images
Lossless and reversible data hiding in encrypted images with public key crypt...
Research Inventy : International Journal of Engineering and Science
Secure reversible image data hiding over encrypted domain via key modulation
SELECTIVE ENCRYPTION OF IMAGE BY NUMBER MAZE TECHNIQUE
Lossless and reversible data hiding in encrypted images with public key crypt...
An ideal steganographic scheme in networks using twisted payload
Reversible data hiding in encrypted images by reserving room before encryption
An ideal steganographic scheme in networks using
Image Encryption-Then-Compression System via Prediction Error Clustering and ...
Protecting Data by Improving Quality of Stego Image based on Enhanced Reduced...
Iaetsd design of image steganography using haar dwt
A secure image steganography based on burrows wheeler transform and dynamic b...
REVERSIBLE DATA HIDING WITH GOOD PAYLOAD DISTORTIONPpt 3
H43064650
Ad

Viewers also liked (10)

PDF
Khawaja Muhammad Safdar Medical College Sialkot Merit List 2014
PPTX
Green Means Go
PDF
32 38pp bioquimica
PDF
CIP Report Deepesh
PPTX
сonnect and protect
PDF
Pourquoi acheter une maison chez un promoteur immobilier
PDF
CEITON Workflow + Scheduling @ IBC 2014
PPTX
Shopan Project Evaluation 1st Qtr.
PPT
www.vzivo.si - neposredni spletni prenos v živo - livestreaming services
PPT
пасха презентация
Khawaja Muhammad Safdar Medical College Sialkot Merit List 2014
Green Means Go
32 38pp bioquimica
CIP Report Deepesh
сonnect and protect
Pourquoi acheter une maison chez un promoteur immobilier
CEITON Workflow + Scheduling @ IBC 2014
Shopan Project Evaluation 1st Qtr.
www.vzivo.si - neposredni spletni prenos v živo - livestreaming services
пасха презентация
Ad

Similar to Dft based individual extraction of steganographic compression of images (20)

PDF
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
PDF
Optimized Reversible Data Hiding Technique for Secured Data Transmission
PDF
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
PDF
A secured data transmission system by reversible data hiding with scalable co...
PDF
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
PDF
A comparative case study on the various techniques of reversible data hiding
PDF
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdf
PPT
ITDNS02.ppt
PDF
IRJET- Encryption and Authentication of Image by using Data Hiding
PDF
Reversible Image Data Hiding with Contrast Enhancement
DOCX
A Review on - Data Hiding using Cryptography and Steganography
PDF
Ijariie1132
PDF
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
PDF
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
PDF
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
PDF
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
PDF
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
PDF
Reversible encrypted data concealment in images by reserving room approach
PDF
F1803063236
IRJET- Reversible Image Data Hiding in an Encrypted Domain with High Level of...
Optimized Reversible Data Hiding Technique for Secured Data Transmission
Decrypt and Encrypt the Image in Cryptographic Algorithm HS Based RDH and LSB...
A secured data transmission system by reversible data hiding with scalable co...
Ensuring Distributed Accountability for Data Sharing Using Reversible Data Hi...
A comparative case study on the various techniques of reversible data hiding
New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams.pdf
ITDNS02.ppt
IRJET- Encryption and Authentication of Image by using Data Hiding
Reversible Image Data Hiding with Contrast Enhancement
A Review on - Data Hiding using Cryptography and Steganography
Ijariie1132
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
REAL TIME DATA TRANSFER VIA VIDEO USING REVERSIBLE DATA HIDING TECHNIQUE
Securing Image Steganogarphy Based on Visual Cryptography And Integer Wavelet...
REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES BY RESERVING ROOM BEFORE ENCRYPTIO...
Two Stage Reversible Data Hiding Based On Image Interpolation and Histogram ...
Reversible encrypted data concealment in images by reserving room approach
F1803063236

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Can fracture mechanics predict damage due disaster of structures
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...

Recently uploaded (20)

PPTX
Internet of Things (IOT) - A guide to understanding
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPT
Total quality management ppt for engineering students
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPT
Project quality management in manufacturing
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
Safety Seminar civil to be ensured for safe working.
PDF
737-MAX_SRG.pdf student reference guides
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
UNIT-1 - COAL BASED THERMAL POWER PLANTS
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
DOCX
573137875-Attendance-Management-System-original
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PPTX
additive manufacturing of ss316l using mig welding
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Internet of Things (IOT) - A guide to understanding
Automation-in-Manufacturing-Chapter-Introduction.pdf
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Total quality management ppt for engineering students
Fundamentals of safety and accident prevention -final (1).pptx
Project quality management in manufacturing
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
Safety Seminar civil to be ensured for safe working.
737-MAX_SRG.pdf student reference guides
Foundation to blockchain - A guide to Blockchain Tech
UNIT-1 - COAL BASED THERMAL POWER PLANTS
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
CYBER-CRIMES AND SECURITY A guide to understanding
573137875-Attendance-Management-System-original
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
additive manufacturing of ss316l using mig welding
III.4.1.2_The_Space_Environment.p pdffdf
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx

Dft based individual extraction of steganographic compression of images

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 199 DFT BASED INDIVIDUAL EXTRACTION OF STEGANOGRAPHIC COMPRESSION OF IMAGES C. Rengarajaswamy1 1 Assistant Professor, Department of Electronics and Communication Engineering, M.A.M School of Engineering, Trichy, Tamil Nadu Abstract A Novel scheme of Separable Extraction of concealed data and compressed image is proposed adopting a transform based compression over the encrypted data. Reversible data hiding is branched under Steganography. In this reversible data hiding the art of concealing a secret data over the cover image is practiced. More than that, the main ingredients that play the key role are encryption key and the data hiding key, the compression is performed in between the two processes i.e., encryption and data hiding, to create a spare space to accommodate the secret data. The main aim of this proposed scheme is to limit the distortion and to enhance a wide space for concealing of the secret data i.e., to increase the embedding rate. The compression here classified into lossy and lossless. Lossy compression best suits for image and audio (telephone conversation, etc.) whereas lossless compression needed in the text and videos. Hence to perform the lossless compression over a stegomized image and improve its secrecy, DFT is performed after Encryption. Keywords: DFT, Data Embedding, RDH, Separable RDH, Compression ----------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION In the world of communication, security plays a vital role and owns a major regime on its stack. The word communication now a day’s does not travel alone, but hand in hand with security aspects. Thus security turns to be the key to unlock a communication box. Coming to security, which is branched into cryptography, information hiding and watermarking etc, provides better role as they take part. As the technology keeps on changing its face with advanced features, there is need to get updated to it in its long run towards the betterment of future. Usually the happening is that when a new algorithm is produced or an existing algorithm is revised, intruders or hackers break the algorithm. So it is a must to develop algorithms more efficient and be stable and unbreakable to most extent. Normally, the network security is branched into cryptography and information hiding. Information hiding contains Steganography and watermarking which may be dated back old compared to cryptography. In cryptography, scramble of data’s takes place at the transmitter and unscrambling them gives the exact input at the receiver section. Thus for scrambling and unscrambling denoted technically as encryption and decryption, a key is used. Thus to encrypt and decrypt same key or different keys may be used. Further extending its branches into symmetric (conventional) and asymmetric (public key) encryption. Here in the former encryption, same key is used both at the transmitter and receiver. Bit in the later case, different key is handled. Coming to Steganography, which is art of concealing of data into other. It may be dated past, but again heads to more secure transmission. In order to improve the security level, combination of various techniques is handled. One such try is the Steganography over cryptography. Thus both the techniques provide better authentication and integrity among the users. One such technique chosen under Steganography is RDH (Reversible Data Hiding). In RDH, major ingredients are the cover data and the secret data. Cover data is which the secret data to be hidden, like the letter enclosed in an envelope. The other is secret or additional data. Here the overall data enclosing the cover data and secret data is called the marked cover. In RDH more importance is given to the cover data, such that the user information is inscribed over it. There is a lot application employing RDH mainly in the case of military communication, patient details, in case of emergency over country, etc. The below diagram illustrates the basic block of how RDH is processed through. Thus embedding secret data to the cover data at transmitter and the reverse process explains abut extracting the secret data as well as the cover data without any error, if error data not recovered. The later part of this paper is lapsed as follows. Section II comprises related works describing RDH and its separable extension. Section III describes the proposed work handling stream cipher encryption and DFT compression and embedding. Section IV gives us the exact view of the proposed scheme as the experimental results using Image Processing Tool. Section V summarizes the whole content to a short and sweet manner. Further, in section VI the references are listed.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 200 Fig 1 Basic Block diagram of RDH 2. RELATED WORKS 2.1 Embedding in LSB A digital image is basically divided into pixels. These pixel values may vary for each type of images. For a Binary image, the pixel value is 1, for gray scale and color the range of pixel is 8-bit and 24-bit. So to carry the LSB embedding process, mostly gray scale and color images are preferred. Here in LSB only the least bits of a pixel is altered or cleared to embed the secret or additional data. If any change is made in the MSB bits, they change the whole nature of the Image. Here the Payload Data (secret Data) is embedded in such a way that can be reconstructed only at the receiving end. The common procedure that is carried out to embed a payload data is given by the formula [1], Si = Ci + Ci mod 2k + mi Here Si - stego image, Ci - the cover image, k - the embedding parameter and mi - the payload. Thus LSB is the most basic method and used in common for creating the sparse space. Thus the sparse space created is useful for hiding the additional payload data. This makes the work easier. Hence at the extraction part it is easier to retrieve the original message as well as the secret data with low data loss. 2.2 Reversible Data Hiding Reversible data hiding (RDH) is a technique which is entirely different from other substitution techniques. In RDH, the main aim is to recover the data without any error. If there is any error either in the cover data or the secret explained as follows. The above diagram shows us how the process is successfully carried out using RDH. The RDH consists of two steps each carried at the transmitter and the receiver end. At the transmitter side the data is embedded into the cover image in the sparse space already created to hide data. Here the additional data hidden in done using the data-hiding key, so that the same key is used at the receiver to recover the secret data. As soon as the compression and embedding process the data is passed to the receiving end along with the data-hiding key. In the receiver end, the extraction process is carried out using the same data-hiding key. During this process if any change is done in the transmitted data, it causes some error in the transmitted data. Thus if any error occurs either in the cover image r the secret data, the original data cannot be retrieved. This is the special property of using RDH which provides additional authentication and integrity. 2.3 RDH over Encrypted Images In this section, RDH is performed over an encrypted Image. Thus it carries three steps and two keys which is same for both the transmitter and the receiver. The first is encryption using encryption key and sparse space creation and third is the data embedding using data-hiding key. The receiver is done in an orderly process i.e., decryption using the encryption key to recover the cover image and then applying the data-hiding key to recover the secret data. If any key is applied without the specified manner the cover image and the secret data cannot be recovered, which is a unique property of RDH [2]. 2.4 Separable RDH over Encrypted Images In the earlier method proposed [2], at the receiver end decryption is performed first in order to extract the cover image and then applying the data-hiding key to recover the secret data, which is non-separable in manner. In the case of separable RDH, either of the key can be used irrespective of the other to recover the respective data’s independently [3] Insecure Channel Cover Image Secret Image Embedding process Marked Cover Transmitter Marked Cover Extraction process Cover Image Secret Image Receiver
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 201 was proposed. This proves to be better flexible among the user handling different keys. Fig 2 Proposed RDH using DFT 3. PROPOSED SCHEME 3.1 Encryption Using Stream Cipher In the encryption part, it is a must to choose what type of encryption is adopted and which is best suitable. Stream cipher encryption is chosen despite its high security and flexibility. In stream cipher, the encryption in carried as bit by bit format, whereas in the block cipher, an entire block is subjected to encryption. In stream cipher, a raw data is XOR- ed with the randomly generated key by the pseudorandom generator. The pseudo random generated key is used both at the transmitter and the receiver. Thus the same key is used to decrypt the data at the receiver end, hence the name symmetric key encryption. Di,j,u = di,j,u ki,j,u Here i,j represents the row and column of the image and u represents the face value of each bit in the pixel. In this encryption, each bit of the pixel is XOR-ed with the key generated by the pseudorandom generator. As the encryption key is pseudo randomly generated and reproduced only at the receiving end, which cannot be produced by any intruders and is difficult to break or analyze the image. A basic algorithm for stream cipher is RC4 provides better security. Thus each and every bit in the data is encrypted and is highly secured. 3.2 Compression using DFT and Data Embedding Compression is a technique for reducing the file size making it suitable for data transmission. There are two types of compression, namely lossless and lossy. Image in its 2-D form can be compressed using various techniques. One primary method is to use Discrete Fourier transform (DFT). DFT gives the better approximation of Fourier transform on discrete set of frequencies. The spatial values in such 2-dimension is represented as f(x,y). The transformed image is represented as F(u,v). 𝐹 𝑢, 𝑣 = 1 𝑀. 𝑁 𝑓(𝑥, 𝑦)𝑒−𝑗2𝜋 ( 𝑢𝑥 𝑀 + 𝑣𝑦 𝑁 ) 𝑁−1 𝑦=0 𝑀−1 𝑥=0 The inverse Fourier transform is thus given by, 𝑓 𝑥, 𝑦 = 1 𝑀. 𝑁 𝐹(𝑢, 𝑣)𝑒 𝑗2𝜋 ( 𝑢𝑥 𝑀 + 𝑣𝑦 𝑁 ) 𝑁−1 𝑣=0 𝑀−1 𝑢=0 Stream Cipher Encryption DFT Compression Information Hiding Encryption Key Cover Image Secret Image Stego Image Compressed Image Data Extraction DFT Decompression Decryption Original Cover Image Encryption Key
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 202 Fig 3 Separable Receiver Section The transform equation suggests that an image of size MxN with spatial values (x,y) is transformed into one with values (u,v) [4]. Fast Fourier Transform (FFT) is the fastest method of DFT. FFT is a high speed and efficient technique. At the reconstruction stage, the image compressed using lossless method will have better image quality than the one that is compressed using lossy method [5]. 3.3 Decryption and Extraction In the receiver side, the reverse process is carried out [3]. Here as the data is received they can be separately extracted independently using either the encryption key which is pseudo randomly generated to extract the decrypted image. Here the same pseudo random generated must be provided by the receiver in order to extract the cover image. Then the data- hiding key is applied to the recovered image to extract the secret data. The keys can be used alternatively to recover any one of the data also. Hence offer better flexibility. 4. EXPERIMENTAL RESULTS (a) Original Cover Image (b) Stream Ciphered Image (c) Secret Image Case 1 Data Extraction Encrypted image containing embedded data Data Hiding Key Additional Data Case 2 Image Decryption Encrypted image containing embedded data Encryption Key Decrypted Image
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Issue: 02 | Feb-2014, Available @ http://www.ijret.org 203 (d) Stego Image Containing Secret Image (e) Extracted Secret Image Fig. 4 Implemented Outputs The figure above shows the results of the proposed system. Initially, an image taken is considered to be a cover image. This image is now given for DFT compression after which the secret image is embedded into the cover. The obtained stego image is then given into a separable receiver for separable extraction of original image and the secret image. CONCLUSIONS In this paper we briefly discuss about how to encrypt a data, compress the encrypted data and embed a data to the compressed one. The later part explains about the extraction and decryption. To summarize all this, at the transmitter side an encryption is carried using the encryption. Then the DFT compression is done to the encrypted image to create the space needed to hide the secret image. In the free space provided the additional secret data is embedded using the data-hiding key. DFT thus provides efficient compression in the frequency domain basis. Then at the receiver side, either of the key is used independently to recover the cover image and the secret data separately. Among more other compression techniques DFT operates well in the frequency domain which is best suited for audio and images. Hereby concluding that DFT provided best compression rate and loss is a least part considering. REFERENCES [1]. C. K. Chan and L. M. Cheng, “Hiding data in images by simple LSB substitution,” Pattern Recognit., vol. 37, no. 3, pp. 469–474, 2004. [2]. Manikandan R Asst. Professor, Uma M , MahalakshmiPreethi S M, “Reversible Data Hiding for Encrypted Image”, Journal of Computer Applications ISSN: 0974 – 1925,Volume-5, Issue EICA2012-1, February 10, 2012 [3]. X. Zhang, “Reversible data hiding in encrypted image,” IEEE Signal Process. Lett., vol. 18, no. 4, pp. 255–258, Apr. 2011. [4]. Inderjit Singh, Sunil Khullar, Dr. S.C. Laroiya, “DFT Based Image Enhancement and Steganography”, International Journal of Computer Science and Communication Engineering, ISSN : 2319-7080, Vol2, Issue 1, Feb 2013. [5]. Mridul Kumar Mathur, Gunjan Mathur, “ Image Compression using DFT through Fast Fourier Transform Technique”, International Journal of Emerging Trends and Technology in Computer Science”, ISSN : 2278-6856, Vol 1, Issue 2, July-Aug 2012.