ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Improved Quality of Image Steganography Using POLPA

T.V.S. Gowtham Prasad1 Dr. S. Varadarajan2 T. Ravi Kumar Naidu3
  1. Assistant professor, Dept. of ECE, Sreevidyaikethan Engineering College, Andhra Pradesh.
  2. Professor, Dept. of ECE, SVU College of Engineering, S V University, Tirupati. Andhra Pradesh.
  3. Assistant professor, Dept. of ECE, Sreevidyaikethan Engineering College, Tirupati. Andhra Pradesh.
Related article at Pubmed, Scholar Google

Visit for more related articles at International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering

Abstract

In the modern steganography, even if hidden information is unable to reveal, its existence changes the statistical properties of the cover media which leads to distortions in the cover media. Distortions in the cover media will make the job of eavesdropper easier to determine whether steganography has been used or not !. As the payload capacity of secret information increases, the distortion in the cover media rises. This breaks the very significance of steganography. In this paper a new approach called Polynomial Based Optimal LSB Pixel Adjustment (POLPA) is implemented to achieve image steganography. This approach improves the payload capacity of the secret information and maximizes the quality of the stegoimage statistically and perceptually. The proposed method is compared with Least Significant Bit insertion and DCT steganography methods over JPEG and BMP image formats. The quality of the steganography measured based on PSNR, Normalized Cross Correlation Error, Universal Image Quality Index (UIQI), Structural Similarity Index Metric (SSIM).

Keywords

Data hiding, Steganography, LSB, DCT, Polynomial, Quality metrics.
 
 

INTRODUCTION

The word steganography is derived from Greek words Steganos and graphia. Steganos means covered and graphia means writing. Thus steganography means covered writing which is an art of covert communication. The word steganography is invented by the Trithemium who done an explicit work on cryptography [1]. Steganography have been under practice from the ancient period. In the history Herodotus discuss several stories such as slave and the shaved head, that gives the evidence for the presence of the secret communication [1, 2, 3]. Later in the 15th century Aleneas proposed different steganography methods including information hiding in the earrings of women, message by pigeons etc [10, 1].
According to Abbas chedda, Italian mathematician Jerome cardem reinvents the Chinese ancient paper masking method. In 19th and 20th century, Nazis invented several methods during Second World War such as microdots, invisible ink, and null cipher. In 1945 Morse code was concealed in a drawing [2,4,5]. In the digital era, steganography plays significant role in many applications where secret communication is necessary. For example, military and intelligence agencies have to pass the information in a secured manner to the recipients in order to restrict the attacks by the enemies. Similarly in law enforcement, counter intelligence agencies, banking, business and trading etc.
Basically steganography is a stream of data hiding. Data hiding is a broad researching area where data is embedded secretly in another file .The purpose is for either authentication or communication. But steganography is used for secured communication especially. Broad classification of data hiding and steganography is given below Figure 1 [1,7, 8]. There are four major challenges in the field of steganography [6, 7, 8].First one is to enhance the security for the communication. Secondly, quality of the stego image i.e., indistinguishable form of a stegoimage to maintain imperceptibility to the malicious user. Thirdly, improvement in the pay load capacity and fourth one is to improve the robustness against the attacks by the unauthorized user i.e., ability to withstand for modifications.
In this paper, polynomial based image steganography using optimal LSB Pixel Adjustment method is implemented and compressions with respective to the LSB[11] and DCT[8, 6] image steganography on jpeg and bmp image formats is present. The performance analysis of these methods is done by measuring the objective and subjective quality metrics such as PSNR, NCCE, UIQI, SSIM[13].

II. METHODOLOGY

This paper presents the methodologies of LSB insertion method, DCT Steganography, POLPA Steganography briefly in below context. In the first LSB insertion based image steganography, secret information is embedding in the least significant bit of the each pixel in the cover image. These changes may not reflect the changes in the visualization of the cover image much but effects the statistical properties of it.
Let us consider an 8-bit color image in which each pixel is represented with 24-bits. Since each pixel consists of three Components Red, Green, Blue. So, we can store 3 bits in each pixel. For example, the letter A can be hidden in three pixels. The original raster data for 3 pixels (9 bytes) may be
(00100111 11101001 11001000)
(00100111 11001000 11101001)
(11001000 00100111 11101001)
The binary value for A is 10000011. Inserting the binary value for A in the three pixels would result in
(00100111 11101000 11001000)
(00100110 11001000 11101000)
(11001000 00100111 11101001)
The underlined bits are the only three actually changed in the 8 bytes used. On average, LSB requires that only half the bits in an image be changed. You can hide data in the least and second least significant bits and still the human eye would not be able to discern it. The steps illustrate the embedding process of the message in the LSB’s of the cover image.
Algorithm:
Inputs : Secret message, cover image.
Inputs : Secret message, cover image.
Start
Select the information to be hiding.
Encode the secret information into binary form.
Choose the suitable cover image.
Encode the cover image into binary form.
Check the size of the message and the cover image.
If cover image is larger then
Embed each bit of the secret information into LSB
bit of each pixel in the cover image in an a predefined pattern.
End
The resultant image is called stegoimage and it is innocuous.
End.
The second method is DCT based image steganography. In this, embedding of the secret information is done in the frequency domain. DCT transform separates the cover image into spectral bands with respect to the low, high and moderate frequency components. As low frequency components of the cover image contains most of the image details apart from high and moderate frequency components, the secret information will be embedded in the low frequency components. Initially the DCT coefficients of the cover image are calculated based on the transformation synthesis equation. Then low frequency coefficients of the cover image are separated and embed the secret information. After that stego image is obtained by the transformation analysis equation. The complete block diagram of the DCT steganography is given in the figure 2 and step by step algorithm is below.
Algorithm:
Inputs : Secret message, cover image.
Outputs: stegoimage.
Start
Select the information to be hiding.
Encode the secret information into binary form.
Choose the suitable cover image.
Apply DCT transform to find coefficients of the cover image
Select a set of low frequency DCT coefficients
Encode the Selected coefficients into binary form.
Check the size of the message and the selected DCT Coefficients.
If no. of coefficients are larger then
Embed each bit of the secret information into the lsb
bit of each DCT coefficient of the cover image.
End
Apply Inverse DCT Transform to ob the spatial domain
The resultant image is called stegoimage and it is innocuous.
End.

III. PROPOSED METHOD

The draw backs that are observed in the previous method such as statistical parameters of the cover image vary largely which degrades the quality of the image. This leads to identify the presence of the secret information perceptually to the malicious users. Even thought the extraction of the secret information is difficult, it loses significance of the steganography. Thus, we proposed a new method Polynomial based Optimal LSB Pixel Adjustment image steganography[7] that minimize the distortion in the stego image as well as the deviations in the statistical parameters, it enhance the quality stegoimage and improves the payload capacity of the secret information. The complete process of the proposed method will be represented in the following schematic Figure 3.
Algorithm:
Inputs : Secret message, cover image.
Outputs: stegoimage.
Start
Select the information to be hiding.
Encode the secret information into binary form.
Choose the suitable cover image.
Encode the cover image into binary form.
Choose appropriate polynomial equation
Find the set of pixels corresponding to the polynomial values.
Check the size of the message and the no. of pixels.
If set of pixels is larger then
If pixel intensity >32
Embed 1-bit of the secret information into the lsb
bit of each pixel in the cover image
elseif 32<pixel>128
Embed 2-bit of the secret information into the lsb
bit of each pixel in the cover image
elseifpixel>128
Embed 3-bit of the secret information into the lsb
bit of each pixel in the cover image
End
Adjust the pixels such that pixel difference with respect to the cover image is minimum
End
End
The resultant image is called stegoimage and it is innocuous.

IV. RESULTS AND DISCUSSIONS

Three steganography approaches using LSB, DCT and proposed method have been implemented in MATLAB bmp and jpeg images such as lenna.bmp, house.bmp and baby.jpeg, peppers.jpeg images. Figure 4 represents the text data chosen for hiding in an innocent cover image. In the Figure 5 stego images were compared with each other and with reference to the original or unmodified cover image. Figure 6&7 visualize the error between cover image and the stegoimage of the LSB, DCT, and POLPA steganography methods in histograms. Here histogram analysis is done for flexibility to observe the pixel difference from cover image to the modified cover image. Histogram analysis and comparison is done for between jpeg and bmp formats, since in images, discernable details of the picture vary with respect to the format.
Stego Image quality analysis and comparison have been done by observing Table 1 & Table 2. UIQI and SSIM metrics give better understanding of features between stego and cover image in the human visual system for effective comparison than the objective metric such as PSNR and NCCE because subjective metric analysis concentrates on correlation, contrast and the brightness or the luminance. But objective metrics concentrates on the statistical properties of the image. From PSNR, NCCE,UIQI and SSIM observations it is clear that error between stego and cover image is significantly minimum for POLPA method with respect to the LSB and DCT method. For good quality image base line values are considered as 100 for PSNR and 1 for NCCE, UIQI, SSIM.

V. CONCLUSIONS

In this paper, a new steganography approach POLPA along with LSB and DCT method was presented, implemented and analyzed. The proposed method hides the secret information based on polynomial values and adjusted in such a way that deviation in the quality of the stego image and the cover image is minimized with respect to the LSB and DCT approaches. Here steganography is implemented for jpeg and bmp image formats in order to test its efficiency. Quality measures were done by using PSNR, NCCE, UIQI and SSIM metrics. From the table and the fig. we conclude that the perceptual and statistical deviation is minimum in the POLPA than the LSB and DCT.
 

Tables at a glance

Table icon Table icon
Table 1 Table 2

Figures at a glance

Figure Figure Figure Figure
Figure 1 Figure 2 Figure 3 Figure 4
Figure Figure Figure
Figure 5 Figure 6 Figure 7
 

References